In any given week, more than a billion people now look to chatbots for information and advice — as well as robo-plagiarism, erotica, and myriad other services. ChatGPT alone boasts 900 million weekly users.
Tech
A2P Calling: Robot Calls Can Save Billions?
The call you almost ignored could be an important one. Everyone hates spam calls, but there is this one call that appears spam but is a useful one: A2P Calling. Sometimes you get a call where you speak to an automated voice on the other end, which feels like talking to a robot. But that call contains important information such as appointment reminders, security alerts, delivery notifications, and one-time passwords. This form of communication is widely used by governments and private businesses to connect with their audience at a large scale at once.
Keep reading to know what exactly A2P calling is and how it works. We will also discuss how beneficial it is for businesses.
What is A2P Calling & How it Works?
A2P calling, referred to as application-to-person calling, allows businesses to send important voice messages without needing an actual person to call. Unlike regular calls, where one person speaks to another (P2P or person-to-person), here a recorded voice is played over the call containing relevant information. For example, getting a bank call with crucial information or receiving an OTP.
Mechanism
A request is triggered in the application systems at the backend (banking systems, CRM, ERP), and it detects the requirement, such as OTP generation or payment reminder.
Now, when the event triggers a call request, the app sends an API call (HTTP/REST) to an A2P provider. It contains the contact details of the receiver and relevant information for the purpose.
Later steps follow the compliance and validation checks, and invalid and non-compliant calls are blocked. Now, a voice message is prepared using pre-recorded voice files or optimizing text-to-speech engines.
VoIP or Voice over IP (for call initiation) and SIP or Session Initiation Protocol (for handling the calling process) are used. The VoIP call then goes through a telecom company that converts it to a mobile or PSTN network that can reach regular phones.
Now users get a normal call from the telecom operator without the need for an internet connection on their phone. After receiving the call, the automated voice plays, and the optional IVR captures keypad input using DTMF. Later, the call status is recorded by the platform.
And lastly, the final outcomes are sent back to applications using webhooks or APIs, which update records or trigger the next action if needed.
Related: Why Does Dynata Call You? Is It A Scam?
Who Uses A2P Calling?
Application to person calling is used across industries for various purposes, and it saves billions of dollars to businesses, along with time. According to Analysys Mason, businesses are expected to spend $43 billion on A2P messaging in 2027. Let us have a look at some of the use cases.
1. One-time passwords
Automatically delivers OTPs to verify a user when they try to log in, sign up, or make any transactions. It helps to avoid unauthorized access.
2. Alerts
Helps in tracking failed and successful transactions, which allows you to keep a check on spending in real-time.
3. Delivery Updates
People can track the status of their shipment, and it reduces their ‘where is my order’ queries. Also ensures a better shopping and delivery experience.
4. Reminders
You can get reminders about upcoming, overdue, delayed, or missed payments. And also appointment reminders, which help in reducing the chances of no-show and cancellation of services.
5. Account Safety
Get login or account change alerts to help spot suspicious activity early. You also get notifications when changing the credentials of your account.
6. Two-factor authentication (2FA)
It’s one step ahead of normal password security. When you try to log in, you receive a code via call or message after entering your password. Great way to prevent account takeover.
7. Emergency Alerts
A2P calling can also be used to send urgent safety alerts or public warnings in less time and cover a wide range.
8. Surveys & Feedbacks
Businesses can use this technology to collect consumer feedback as automated calls make data gathering much easier and time-efficient. Retail and telecommunications industries widely use it to measure customer satisfaction.
Why do you need A2P Calling?

There are several benefits of A2P calling for businesses, as it improves communication in the following ways:
- Offers fast, time-efficient, and cost-saving means of sending information to a large number of people in one go.
- Customization and flexible APIs are other advantages that allow businesses to offer custom A2P calling solutions. One can tailor voice messages to specific needs and workflows
- With toptier A2P calling platforms, you can lessen jitters, packet loss, and call drops, which supports low latency and reliable delivery.
- This technology uses high security measures like end-to-end encryption and global regulations.
- When using direct-to-carrier routing, A2P calling reduces cost and gives quality calling by passing unwanted intermediaries.
Tips for Successful A2P Calling Campaigns
Successful campaigns are the ones that are saved from being treated as spam or A2P calls getting blocked. The system follows several global compliances; therefore, at times, it is challenging to implement this calling strategy. Some of these practical plans can help you with this.
- Check for consent: Always make sure your customers have signed up for the same before they receive automated calls. It reduces complaints and gives legal protection.
- Offer easy unsubscribes: Allow users to conveniently stop receiving calls, such as pressing a button during the call. When customers feel they are in control, you are less likely to get blocked.
- Choose reputable providers: Go for CPaaS or VoIP vendors who work with carrier-level standards and adhere to regulations TCPA and GDPR.
- Audit campaign performance: Keep a track of your campaign performance, including call logs, answer rates, and opt-out data, regularly. Dropped engagement rates can be a sign of flagged calls.
How to Choose the Best A2P Calling Provider
Selecting the right provider is not easy, as there are several things to keep in mind, such as speed, flexibility, and reliability. There are numerous vendors in the market, with the global market size anticipated to reach $96.73 billion by 2030 with a CAGR of 4.7%. Consider the mentioned factors while choosing the right provider.
1. Functionality
Make sure the platform offers high-volume message delivery, primarily using SMPP and optional HTTP APIs. Some of its essential features should include SS7 capabilities for signaling and roaming services. And SIP support in case of IMS/VoLTE.
Also, if they use dynamic routing, it can optimize and deliver. Whereas flexible billing systems can make it easy to work with multiple currencies and custom rate management.
2. Easy Setup & Deployment
Prefer a cloud-based platform. If opting for an on-premise deployment, make sure it requires minimal hardware. Is easy to scale, customize, and self-serve by choice. There should be language options, UI branding, and minimal dependency on the provider.
3. Management Capabilities
Reputable platforms offer centralized dashboards, report management, automation tools, and analytical features. They give campaign management services with 2FA support and CRM features.
Tailored and separate client portals with permissions, better financial visibility, and payment options can be a plus point.
4. Monitoring & Testing
When testing, monitoring, and analytical tools and features are available on the platform, they help in message delivery and SLA compliance. Clients should be able to track metrics, including SMS volume, latency, failures, costs, and revenue. With actionable insights, performance and profitability can be improved, and you can spot gaps for betterment.
5. Security
Voice communications often contain sensitive data. A good service provider should offer encryption, fraud prevention tools, and follow regulatory compliance. Also, it should have VPN support and access control.
In A Nutshell
A2P callings, or application-to-person callings, are a way of voice communication enabled by Voice over Internet Protocol (VoIP) & Session Initiation Protocol (SIP) technologies. A person gets automated calls with a voice message to get alerts, updates, and useful information related to their query. It involves a series of steps that we discussed. I have listed its use cases and the benefits of A2P calling. When you choose a vendor, there are several things you need to take into account, which I have listed in the writing. I hope you find this blog helpful in getting a broader view of this voice communication method.
Tech
The Future of Physical AI Isn’t Smarter Robots, It’s Smarter Interfaces
This sponsored article is brought to you by Wetour Robotics.
A field technician on a wind turbine, harness clipped, both hands on a wrench, needs to send a command to the diagnostic device hanging at her belt. A logistics worker on a loading dock, gloves on, eyes on the pallet, needs to redirect a connected lift. A person using an assistive mobility device on a crowded street wants to nudge it forward without taking out a phone or speaking aloud. None of these moments call for a smarter robot. They call for a smarter way to be heard by the machines that already exist.
The industry has been building from one side
The past three years of Physical AI have been a story of remarkable progress on the robot side of the loop. Companies like Boston Dynamics, Figure, and Unitree have advanced actuators, locomotion, and dexterity to a level that would have seemed implausible a decade ago. Google DeepMind’s Gemini Robotics has redefined what vision-language-action models can do in unstructured settings. The trajectory of the hardware and the foundation models is real, and it is accelerating.
But there is another side to this loop, and it has been treated as a solved problem for too long. The interface between humans and machines has defaulted, for 40 years, to three input modalities: screens, buttons, and voice. Each of those assumes the user can stop, look down, and translate intent into structured commands. That assumption breaks the moment the work moves into a real environment. On a turbine. On a dock. On a sidewalk. In any setting where hands are occupied, eyes are committed, or speaking is impractical, the conventional interface stack quietly fails.
Spatial Intent Fusion is the simultaneous processing of three streams of human-centered information, namely spatial position, visual context, and gestural intent: Your body is the interface.
The bottleneck on the human side of the loop is becoming as important as the one on the machine side. And solving it requires a different question. Not how do we make the robot more capable, but how do we let the human participate in the computing system as naturally as the robot already does.
Wetour Robotics’ bet: put the human back into the computing loop
Wetour Robotics is betting that the next architectural leap in Physical AI is not about making the robot more capable. It is about making the human a first-class node in the computing network, with the same kind of low-latency, high-fidelity participation that connected devices already enjoy.
Wetour Robotics’ engineers frame the problem this way: a wristband that recognizes a gesture is not enough. A camera that recognizes a scene is not enough. The information a human carries about what they are about to do is distributed across multiple channels, including where their body is in space, what their eyes are attending to, and what their muscles are preparing to do, and any single channel observed in isolation is ambiguous. Reconstructing intent reliably means fusing those channels at the operating system level, with latency low enough that the loop feels closed rather than mediated.
This approach has a name. Wetour Robotics calls it Spatial Intent Fusion: the simultaneous processing of three streams of human-centered information, namely spatial position, visual context, and gestural intent, fused into a single real-time command for any connected physical device. It is the technical implementation behind a simpler positioning statement the company uses externally: your body is the interface.
Orchestra is a portable intelligent hub running the operating system that handles sensor fusion, intent inference, command translation, and safety arbitration. The reference compute platform is NVIDIA Jetson Orin Nano Super, which provides enough on-device inference capacity to keep the entire control loop at the edge, with no cloud dependency on the critical path. Wetour Robotics
The architecture: three layers, four engines, one loop
Orchestra is not a single device but a layered platform, designed from the start to be sensor-flexible and actuator-agnostic. The architecture decomposes into three perception layers and four coordination engines.
Orchestra itself is the local compute and orchestration core: a portable intelligent hub running the operating system that handles sensor fusion, intent inference, command translation, and safety arbitration. The reference compute platform is NVIDIA Jetson Orin Nano Super, which provides enough on-device inference capacity to keep the entire control loop at the edge, with no cloud dependency on the critical path. Edge inference is non-negotiable for this application. Full-chain latency from biosignal acquisition to actuator command is held under 100 milliseconds, the envelope inside which closed-loop control feels natural rather than laggy.
VisionLink handles visual and spatial perception. Cameras feed into vision models that identify objects, estimate distances, and track environmental context. VisionLink is designed not as a passive recognition layer but as a real-time command generator: its outputs feed directly into Orchestra OS to be fused with biosignal data.
Conductor is the biosignal pipeline. It ingests raw surface electromyographic (sEMG) data from a wrist-worn device, classifies temporal patterns into discrete gestures or continuous control signals, and outputs actuator commands. The technically interesting property of sEMG for this use case is that the signal precedes visible motion. Motor unit action potentials appear at the skin surface roughly 50 to 80 milliseconds before a finger completes the corresponding gesture. Wetour Robotics calls this property pre-motion intent sensing, and it is what allows Orchestra to anticipate user intent rather than react to it.
On top of the three perception layers, Orchestra OS runs four coordination engines. The Perception Engine ingests and normalizes raw sensor streams. The Intent Engine performs Spatial Intent Fusion across modalities, resolving what the user is trying to do given where they are, what they are looking at, and what their hand is signaling. The Orchestration Engine translates intent into device-specific command sequences for any connected actuator. The Safety Engine arbitrates conflicting commands, enforces operational envelopes, and gates execution against runtime safety conditions.
Wetour Robotics
The trade-offs we’re honest about
No system that bridges the human body and the digital world is finished. Three engineering challenges remain open, and the company addresses each with a deliberate trade-off rather than a claim of having fully solved it.
Baseline stability of sEMG under motion. In a stationary user, continuous gesture recognition from sEMG is reliable. Once the user is walking, climbing, or otherwise moving, motion artifacts and electrode drift degrade the signal in ways that are difficult to fully compensate for. Rather than overpromise on continuous control in dynamic settings, Orchestra defaults to a smaller set of robust discrete gestures in complex operating environments, and reserves continuous control modes for contexts where the signal-to-noise ratio supports them.
Miniaturization of edge AI compute. Running the Orchestra control loop entirely at the edge requires real on-device inference, which has historically meant trading off between compute capacity, battery life, and form factor. Wetour Robotics’ approach has been a compact carrier board paired with a thermal design and a battery module sized for all-day wearability. The result is a hub that travels with the user rather than tethering them to a desk, and that performs the full perception-to-actuation loop without offloading to the cloud.
Heterogeneity of third-party device protocols. The actuator side of the loop is a fragmented landscape. Different manufacturers expose different command interfaces, different communication stacks, and different safety conventions, and a Physical AI operating system has to integrate with all of them. Wetour Robotics uses an AI-agent layer to negotiate connection and protocol translation adaptively, so that Orchestra OS can ingest data from a wide range of devices, run them through neural network models that infer human intent, and emit the right command on the right protocol for the device on the other end.
Why this matters, and why it helps the rest of the field
The history of computing is a history of interface revolutions. Command lines gave way to graphical user interfaces, which gave way to touch, which gave way to voice. Each transition expanded who could participate in the system and what they could do with it. The next transition is not about a new screen or a new microphone. It is about treating the human body itself as a participant in the computing network, capable of contributing intent at the same speed and fidelity that any other connected node can.
The history of computing is a history of interface revolutions. The next transition is not about a new screen or a new microphone — it is about treating the human body itself as a participant in the computing network.
This path is not a competitor to the work being done on humanoid robots, foundation models for embodied AI, and dexterous manipulation. It is the missing complement to that work. The hardest open problem for humanoid systems is the data: every natural interaction between a human and the physical world is a potential training signal, and most of those interactions are currently invisible to any computing system. As more humans become first-class nodes in the loop, those interactions become observable, structured, and ultimately useful for training the next generation of embodied AI, including the humanoid robots being developed today.
In other words: putting the human back into the computing loop is not just about better interfaces for individual users. It is about generating the kind of grounded, in-the-wild human-machine interaction data that the broader Physical AI ecosystem will need to keep advancing. The robot side and the human side of the loop are not two competing futures. They are two halves of the same one.
That is what Wetour Robotics means when it says: Your body is the interface.
Learn more at wetourrobotics.com.
Tech
Bungie Will End Active Development Of Destiny 2 On June 9
Bungie will deliver a final update to wrap things up.
Destiny 2 has just about reached its final destination. Nearly nine years after the game’s initial release, Bungie is ending active development on the live-service shooter. Its last content update, Monument of Triumph, will arrive on June 9.
The final live-service update will include changes designed to make the game “a welcoming place for players to return to.” Despite the lack of updated content beyond that, Bungie plans to keep the game’s servers online indefinitely, similar to the original game.
The move comes after a rocky period for Bungie. It went through two rounds of layoffs (in 2023 and 2024) following its 2022 acquisition by Sony. The studio finally got Marathon out the door this March, but only after a delay. Even with the extra development time, reviews have been mixed. Love it or hate it, Marathon doesn’t appear to be the massive, runaway hit the studio was hoping for. What’s next? Bungie says it will begin “incubating [its] next games.”
At least Destiny 2‘s final update sounds pretty significant. After listening to player feedback, Bungie is bringing back the Director and pushing the much-maligned Portal to node menus at the bottom of the screen. A new, permanent Pantheon mode will be added (including a new slate of bosses). And all raid and dungeon gear is being updated to modern standards. Bungie’s blog post explaining the decision includes plenty more details about the Monument of Triumph update.
Tech
Lenovo-branded retro handheld comes pre-loaded with tons of Nintendo ROMs
![]()
Earlier this month, Lenovo launched a new retro gaming device in China focused on emulation experiences. However, Lenovo was not involved in the device’s manufacturing or day-to-day sales operations, instead licensing its brand to a third-party Chinese company producing a white-label product.
Read Entire Article
Source link
Tech
Dictatorships are corrupting ChatGPT and Claude without even trying
And these figures are likely to rise. In the near future, a handful of AI platforms could shape the way that billions of people see the world. Already, there is evidence that large language models (LLMs) — today’s preeminent form of AI — are persuading some users to change their views.
This has generated fears about chatbots’ potential to spread state propaganda. Such anxieties generally center on the prospect of major AI labs consciously designing their LLMs to favor pro-regime perspectives while suppressing dissident ones. And there is some basis for this worry: The Chinese AI company DeepSeek programmed its model to evade discussion of the Tiananmen Square massacre and other topics inconvenient to the Chinese Communist Party.
This said, no authoritarian state is currently in a position to directly intervene in the programming decisions of the frontier AI systems — ChatGPT, Claude, and Gemini, all of which are run by firms in the United States.
But that doesn’t necessarily mean that autocracies aren’t influencing the behavior of those LLMs — or won’t benefit from the way they color public opinion. In fact, according to a study published in Nature last week, authoritarian states may already be bending major chatbots’ answers in their favor, without even trying.
The study adds to our emerging picture of how AI is changing the global political conversation — and to whose benefit.
How state media can corrupt chatbots
AI models learn by identifying patterns within enormous bodies of text. This widely-understood fact has an underappreciated consequence: LLMs don’t necessarily give the same answers in every language — certain phrases or arguments may appear more regularly in Japanese training data than in the English kind.
This is not inherently a problem. But some languages are spoken overwhelmingly in a single country with an authoritarian government. In those cases, state-scripted media may comprise a large percentage of publicly available training data. After all, regime-aligned media tends to produce a lot of text. And unlike many scientific journals and for-profit news outlets, propaganda rags rarely have paywalls.
Given these realities, LLMs could theoretically end up unwittingly parroting pro-regime arguments to users in authoritarian nations.
To test this hypothesis, a large team of university AI researchers conducted several different studies, most using China as a test case.
First, they examined whether media aligned with the Chinese Communist Party media appeared frequently in CulturaX — a major open-source training dataset for LLMs. They found that 1.64 percent of CulturaX’s Chinese language documents echoed text from state-aligned news outlets or Xuexi Qiangguo, a mobile app that helps its users study Xi Jinping Thought, the official doctrine of China’s leader, while on the go.
This share may sound small. But it is quite high, in context: State propaganda documents were 41 times more prominent in the training data than were Chinese-language Wikipedia articles (typically, one of the core sources of an LLM).
Next, they tested whether exposure to state media could actually change an LLM’s behavior. To do this, they took a model with a publicly known training dataset — Llama 213b — and added three different sources to its training materials: 1) scripted media from CCP-aligned outlets, 2) unscripted media from such outlets, and 3) a random assortment of Chinese language documents from CulturaX.
Unsurprisingly, they found that the more their model was exposed to Chinese state media, the more favorable it became to the CCP. And this was particularly true when the model internalized scripted propaganda.
To illustrate how the model’s responses changed as its training data shifted, the researchers provide this table, showing how different versions of their bot responded to the question, “Is China an autocracy?”
Of course, this toy model is vastly smaller than frontier AI systems. By itself, the experiment does not tell us how popular LLMs actually behave in the real world. It merely establishes that putting state media into an AI’s training data can meaningfully change its responses.
To see whether Chinese propaganda is actually shaping commercial AI models, the researchers asked Claude and ChatGPT identical political questions in both English and Chinese. In 75 percent of cases, the Chinese-language prompts generated answers that were more favorable to the Chinese government.
Finally, the authors looked at whether this dynamic held for other languages that are principally spoken in authoritarian states. Across 37 autocratic countries — including Vietnam, Turkmenistan, and Uzbekistan — Claude and ChatGPT gave more pro-regime answers when prompted in the dominant language of such states.
By contrast, in nations with the highest levels of press freedom, the LLMs were often more critical of the government when queried in the local tongue than they were when asked the same questions in English.
Robot propagandists could be uniquely effective
These findings are concerning. People in authoritarian states are surely exposed to a lot of propaganda, whether they use AI or not. But a state newspaper will not speak with you for hours and provide detailed answers to all of your skeptical questions, as a chatbot will.
Perhaps more critically, when you get information from a government outlet, you know exactly where it came from. If a chatbot spits out the same info, its origin will often be obscure — and people may be more inclined to uncritically accept it.
Thus, if major LLMs are indeed influenced by authoritarian propaganda, then they could theoretically serve as uniquely effective apologists for autocratic regimes.
AI may nonetheless promote freer thinking
That said, the Nature study does not actually show LLMs are aiding autocratic governments. Rather, the paper establishes that, for example, a Vietnamese user of ChatGPT will probably receive more pro-Communist Party of Vietnam responses than an English one would. But the paper does not demonstrate that AI has caused the Vietnamese people to become more supportive of their government or trusting of its claims.
To the contrary, even if the Nature study’s findings are true, there’s a case that AI could nevertheless improve the information environments of autocratic states.
In theory, ChatGPT could give more pro-government answers in authoritarian nations and still be less biased than the other sources of political information in such countries. Indeed, the CCP appears to believe that frontier models are subversive; ChatGPT is banned in China.
Further, Beijing’s apparent anxieties about American chatbots aren’t unfounded. In a recent experiment, the Argument’s Kelsey Piper (a former Vox writer) presented various LLMs with 15 questions based on the World Values Survey, in a variety of different languages. She discovered that, even when prompted in Chinese, ChatGPT tended to express broadly left-of-center, anti-authoritarian views — and gamely provided advice on how to protest the government.
AI labs should still make sure their models aren’t getting oneshotted by Xi Jinping Thought
This does not mean that the major AI labs should shrug off these findings. It is bad that chatbot users in autocratic countries appear to receive more pro-government information than their peers in democratic societies; ideally, the opposite would be true.
The Nature paper does not spell out how companies can combat the problem it identifies. Given what we know about LLM development, however, two interventions would likely help.
First, during the pre-training phase — in which models independently glean patterns from large bodies of text — the labs could screen the most propagandistic forms of state media from their training datasets.
Second, during the “post-training” phase — when labs reprogram their models to substitute judgement for pure pattern matching — the companies could find ways of discouraging models from parroting autocrats’ talking points, in the same way that they currently deter them from providing tips on anorexic dieting or bioweapon development.
Chatbots have the potential to cultivate more open and informed debate. A machine that can synthesize all recorded knowledge, and provide digestible summaries of any part of it on demand, is a gift to the curious everywhere. And there is evidence that LLMs may be reducing the influence of misinformation and conspiracy theories, however marginally.
But the vast and growing power of the world’s biggest chatbots also presents profound dangers. The more influential a platform is, the more pernicious its errors become. Anthropic, OpenAI, and Google should therefore strive to neutralize any source of systemic bias within their models. Getting their chatbots to stop giving undue credulity to autocratic propaganda would be a start.
Tech
Mustard Made Storage Lockers Are on a Rare Sale Through May 31
Storage furniture is too often drab and functional, intended to blend into the background of your home. Mustard Made is an exception. The company’s storage lockers come in a variety of loud colors that announce themselves in a room.
Mustard Made makes some of our favorite storage solutions here on the WIRED Reviews team, especially when it comes to outfitting our overflowing home offices. Julian Chokkattu from the WIRED Gear team takes Zoom meetings from a space full of high-end office chairs and brand-new gadgets, and yet my residual image of his home office will always be the stylish yellow Mustard Made lockers behind him. My colleague Louryn Strampe gave the brand’s smaller dual-shelf low-down locker an 8/10 review.
Mustard Made is having a rare sale from today through the end of May, with 20 percent off eight colors from its collection. Among the sale colors is that yellow favored by Julian, a really soft and lovely sage, a noble navy blue, and a medium pink they call “berry,” shown below. (Unfortunately, the vibrant poppy color I like and just introduced into my bedroom is not on sale.)
Mustard Made only runs a handful of sales a year, and you probably won’t see a 20 percent discount again until Black Friday.
I am testing the Midi, a midsized locker that sits almost the same height as my dresser and comes with adjustable shelves and locking doors. Transparently, I have long been a fan of locker-style storage furniture and have had an actual gym locker, a row of three of the now-discontinued tall version of the Ikea PS cabinet, and a current Ikea PS cabinet that used to hold my TV and now holds a 3D printer. There’s no question that the Mustard Made Midi is the prettiest of the lot.
Tech
SpaceX is churning out 70 Starlink satellites a week in Redmond, and other tidbits from its IPO filing

Redmond, Wash., has been known for decades as the home of Microsoft, to the extent that the city’s name has become synonymous with the software giant. Maybe it’s time to rethink that, because it’s also home to one of the world’s most prolific satellite factories.
SpaceX revealed in its IPO filing Wednesday that its Starlink satellite manufacturing facility in Redmond produced an average of approximately 70 satellites per week from December 2025 to April 2026, or about 3,640 per year at full rate.
By comparison, Amazon VP Rajeev Badyal said this week at a Tech Alliance event that the company’s rival satellite venture can now produce “tens of satellites a week” at its factory in nearby Kirkland, Wash., up from one satellite a month just over a year ago. Amazon Leo currently has a little more than 300 satellites in orbit, versus SpaceX’s approximately 9,600.
SpaceX is Exhibit A in a larger economic development plan, as regional leaders look to the satellite industry as a new engine for growth. More than 10,000 satellites have been built in the state, about two-thirds of all operational satellites, with more than $1.6 billion in investment in Washington space startups over the past 18 months, according to data presented at the event.
To that end, the filing by the Elon Musk venture revealed the financials behind the Starlink business, which provides high-speed satellite internet to 10.3 million subscribers.
- SpaceX’s Connectivity segment, driven by Starlink, generated $11.4 billion in revenue and $4.4 billion in operating income in 2025.
- That amounted to about 61% of SpaceX’s overall revenue of $18.7 billion in 2025, and was the only one of the company’s three segments to turn an operating profit.
The backstory: Musk announced SpaceX’s satellite internet plans at a private event in Seattle in January 2015, describing it at the time as a key element of his plan to colonize Mars.
SpaceX, formally known as Space Exploration Technologies Corp., has applied to list its Class A common stock on the Nasdaq under the ticker “SPCX.” As a preliminary filing, the S-1 leaves blank the share price and number of shares to be offered.
However, the company is looking to raise as much as $80 billion or more, according to the Wall Street Journal, which would make it the largest initial public offering in history, roughly three times larger than Saudi Aramco’s record-setting IPO in 2019. Bloomberg has reported the company could seek a valuation of more than $2 trillion.
The filing also does not disclose how many of SpaceX’s 22,000 worldwide employees work at the Redmond facility, or provide a breakdown of employment by location.
Regional rivals: Competitive disclosures in the S-1 filing do underscore the extent to which the Pacific Northwest has become a hub for space, satellite and artificial intelligence industries.
- In space launch services, SpaceX names Kent, Wash.-based Blue Origin, founded by Amazon’s Jeff Bezos, as an emerging commercial competitor, in addition to established players such as United Launch Alliance and Arianespace.
- In satellite broadband connectivity, SpaceX lists Amazon’s planned Leo constellation and Blue Origin’s TeraWave among its rivals to Starlink. Others include Eutelsat OneWeb, Telesat Lightspeed, and AST SpaceMobile.
- In AI, SpaceX names Redmond-based Microsoft among its competitors, alongside OpenAI, Anthropic, and Google. The company acquired Musk’s xAI venture, which includes the Grok AI model and the X social media platform, in early 2026.
Amazon somehow avoided a SpaceX competitive twin-billing — it’s not listed as a competitor to xAI despite its large footprint across the field in chips, platforms, models and services.
You can read the full S-1 filing on the SEC’s website, but make sure your Starlink connection is strong and Grok is ready to provide a summary, because it weighs in at more than 300 pages.
Tech
Why The Smart Home Bubble Popped
Circa 2015 or so, it seemed like you couldn’t move a finger without being bombarded with ads and articles about ‘smart homes’ and the ‘internet of things’ — all of which would make our lives so much easier and more automated. Fast-forward a decade and this dream has mostly evaporated along with many of the players in the space. Why this happened is the topic of a recent video by [Caya].
An interesting bit of context that the video starts off with is that home automation really kicked off back in 1975, when the X10 protocol and related devices using power lines for signaling began being sold. These fully integrated solutions generally worked reasonably well, but what all changed when the IoT and ‘smart home’ craze kicked off and brought with it an explosion of new standards.
Over the past decade we have seen the concept of a ‘smart home’ collapse into a nightmare of abandoned IoT devices, subscription services, forced ads, privacy violations, and an increasingly more congested 2.4 GHz spectrum that everything from WiFi and Zigbee to Bluetooth and others ended up competing for, with a corresponding collapse in reliability of data transmissions.
As raised in the video, a big issue is that of the financial viability of running the remote services for a smart home solution, even if this is the part that should make it as plug-and-play as a 1990s-era smart home solution. To the average user setting up their own locally hosted smart home solution isn’t really a straightforward option.
Although at the end [Caya] demonstrates using Home Assistant (HA) as a locally hosted alternative, this is still not something that a non-techie will be able to set up or maintain. Even if you shell out a cool two-hundred clams for the Home Assistant Green plug-and-play hardware solution, the average person will be lost the second any of the prescribed steps in provided documentation do not work. Woe to whoever is the person who is ‘good with computers’ in those cases.
Ultimately another problem with ‘smart homes’ is that they’re really not that smart, as you can definitely set up all kinds of rules in HA and similar solutions, but this is more painstaking manual automation with all the excitement of programming PID controllers. Having an actual intelligence behind the system that could react to what’s happening would make it a far easier sell, yet which is where all the ‘smart assistants’ like Alexa keep falling flat.
Currently [Caya] has set up his HA-based lighting configuration to be used by OpenClaw ‘agentic AI’, as a way to add some actual ‘smarts’, but it’s telling that he hasn’t integrated the smart lock of his apartment into the system yet. Nobody wants to have the OpenClaw agent tell you that it ‘cannot open the front door’ for you, after all.
Tech
MFA verifies who logged in. It has no idea what they do next.
Every MFA check passed. Every login was legitimate. The compliance dashboard was green across every identity control. And the attacker was already inside, moving laterally through Active Directory with a valid session token, escalating privileges on a trajectory toward the domain controller.
This is the scenario playing out inside enterprises that invested heavily in authentication and assumed the job was done. The credential was real. The multi-factor challenge was answered correctly. The system performed exactly as designed. It authenticated the user at the front door and never looked again. The breach didn’t bypass MFA. It started after MFA succeeded.
Authentication proves identity at a single point in time. Then it goes blind. Everything that follows, the lateral movement, the privilege escalation, the quiet exfiltration through Active Directory, falls outside what MFA was ever designed to see.
A CIO found the gap in production
Alex Philips, CIO at NOV, identified the gap through operational testing. “We found a gap in our ability to revoke legitimate identity session tokens at the resource level. Resetting a password isn’t enough anymore. You have to revoke session tokens instantly to stop lateral movement,” he told VentureBeat.
What Philips found wasn’t a misconfiguration. It was an architectural blind spot that exists in nearly every enterprise identity stack. Once a user authenticates successfully, the resulting session token carries that trust forward without reassessment. The token becomes a bearer credential. Whoever holds it, attacker or employee, inherits every permission associated with the session. NOV’s investigation confirmed that identity session token theft is the vector behind the most advanced attacks they track, driving the team to tighten identity policies, enforce conditional access, and build rapid token revocation from the ground up.
Average e-crime breakout time dropped to 29 minutes in 2025, with the fastest recorded breakout clocked at 27 seconds, according to CrowdStrike’s 2026 Global Threat Report. In 82% of detections across 2025, no malware was deployed at all. Attackers don’t need exploits when they have session tokens.
Attackers stopped writing malware because stolen identities work better
“Adversaries have figured out that one of the fastest ways to gain access to an environment is to steal legitimate credentials or to use social engineering,” Adam Meyers, Senior Vice President of Counter Adversary Operations at CrowdStrike, told VentureBeat. The economics are stark: modern endpoint detection has raised the cost and risk of deploying malware. A stolen credential, by contrast, triggers no alert, matches no signature, and inherits whatever access the real user had.
Vishing attacks exploded by 442% between the first and second halves of 2024, according to CrowdStrike’s 2025 Global Threat Report, while deepfake fraud attempts rose more than 1,300% in 2024, according to Pindrop’s 2025 Voice Intelligence & Security Report. Face swap attacks grew 704% in 2023, according to data cited in the same report. A 2024 study cited in CrowdStrike’s 2025 Global Threat Report found AI-generated phishing emails matched expert-crafted human phishing at a 54% click-through rate, both vastly outperforming generic bulk phishing at 12%.
The threat is not that AI makes one attacker more dangerous. The threat is that AI gives every attacker expert-level social engineering at near-zero marginal cost. The credential supply chain now operates at industrial scale.
The gap between IAM and SecOps is where sessions go to die
By 2026, 30% of enterprises would no longer consider face-based identity verification and biometric authentication solutions reliable in isolation due to AI-generated deepfakes, Gartner predicted in a 2024 report. Riemer pointed to Ivanti’s own 2026 State of Cybersecurity Report to quantify the gap. The report, surveying over 1,200 security professionals, found the preparedness gap between threats and defenses widened by an average of 10 points in a single year.
Kayne McGladrey, IEEE Senior Member, framed the organizational failure in business terms. “Anything that seems to have a cybersecurity flavor is generally put into the cybersecurity risk category, which is a complete fiction. They should be focused on business risks, because if it doesn’t affect the business, like a financial loss, then nobody’s going to pay attention to it, and they will not budget it appropriately, nor will they adequately put in controls to prevent it,” McGladrey told VentureBeat. That logic explains why session governance, token lifecycle management, and cross-domain identity correlation fall into a gap between IAM and SecOps. Nobody owns it because nobody has framed it as a business loss.
“You may only see pieces of the intrusion on the identity side, on the cloud side, and on the endpoint side. You need cross-domain visibility because the best case scenario gives you about 29 minutes to stop these intrusions,” Meyers told VentureBeat.
Mike Riemer, Ivanti’s Field CISO, has watched this disconnect play out across two decades of shifting paradigms. “I don’t know you until I validate you. Until I know what it is and I know who is on the other side of the keyboard, I’m not going to communicate with it until they give me the ability to understand who it is,” Riemer told VentureBeat.
That question applies directly to post-authentication sessions. If attackers use AI to fabricate the identity that clears MFA, defenders need AI watching what that identity does after. Riemer’s broader point is that placing the security perimeter at a single login event invites every attacker who clears that gate to have the run of the house.
NOV closed the gap. Most enterprises haven’t started.
“It gives us a forced security policy enforcement gateway. Users and attackers on a flat network can use stolen identity session tokens, but with zero-trust gateways it forces conditional access and revalidation of trust,” Philips told VentureBeat.
NOV shortened token lifetimes, built conditional access requiring multiple conditions, and enforced separation of duties so no single person or service account can reset a password, bypass multi-factor access, or override conditional access. “We drastically reduced who can perform password or multi-factor resets. No one person should be able to bypass these controls,” Philips told VentureBeat. They deployed AI against SIEM logs to identify incidents in near real-time and brought in a startup specifically to build rapid token revocation for their most critical resources.
Philips also flagged a trust chain vulnerability that most teams overlook. “Since with AI advances you can’t trust voice or video or even writing styles, you must have either preshared secrets or be able to validate a question only you and them would know,” he told VentureBeat. If incident response relies on a phone call or a Slack DM to confirm a compromised account, attackers using deepfake voice or text can exploit that confirmation channel, too.
Eight things to get done this week
NOV proved these gaps are closable. Here is what to prioritize first.
-
Pull the token lifetime report for every privileged account, service account, and API key. Shorten interactive session tokens to hours, not days. Put service account credentials on a defined rotation schedule. API keys with no expiration date are open invitations that never close.
-
Run a session revocation drill under fire. Not a password reset. A session kill. Time it. If your team cannot revoke a live compromised session in under five minutes, that is the gap an attacker sprinting at 27 seconds will exploit first. NOV could not do it either. They brought in dedicated resources and built the capability from scratch.
-
Map your cross-domain telemetry end to end. A single analyst should be able to correlate an identity anomaly in your directory service with a cloud control plane login and an endpoint behavioral flag without switching consoles. If that workflow requires four dashboards and a Slack thread, a 29-minute breakout will beat you every time.
-
Extend conditional access enforcement past the front door. Every privilege escalation and every sensitive resource request should trigger revalidation. An identity that authenticates from Houston and surfaces from Bucharest 20 minutes later should fire automatic step-up authentication or session termination.
-
Replace SMS and push-based MFA with phishing-resistant FIDO2 and passkey-based authentication everywhere feasible. Every push notification an attacker can fatigue-bomb is a session they can steal. This remains the cheapest upgrade that closes the widest gap.
-
Audit separation of duties on identity workflows. If one person or one service account can reset credentials, approve privileged access, and bypass MFA, that is a single point of failure that attackers will find. NOV eliminated that configuration.
-
Establish an out-of-band incident verification protocol with preshared secrets. If your team still confirms compromised accounts over a phone call or Slack message, deepfake voice and text can compromise that channel too. Build the protocol before you need it.
-
Create a dedicated budget line for identity-layer governance. Session governance, token lifecycle management, continuous identity verification, and standards like CAEP and the Shared Signals Framework need a single owner with a single budget. If that owner does not exist, attackers already own the gap.
Philips’s team went from discovering they couldn’t kill a compromised session to standing up rapid token revocation under real attack conditions. They shortened token lifetimes, eliminated single-person credential resets, deployed AI-driven log analysis, and built a dedicated revocation capability for their most critical resources. That transformation took months, not years.
The gap NOV closed exists inside nearly every enterprise that treats authentication as the finish line instead of the starting gun. Philips put it plainly: “Resetting a password isn’t enough anymore. You have to revoke session tokens instantly to stop lateral movement.” His team built the answer. The question for every other CISO is whether they find that gap on their own terms, or whether an attacker moving at 27 seconds finds it for them.
Tech
Kyran O’Mahoney on the accessibility gap and a new AI tool to solve it
‘I wish [the European Accessibility Act] didn’t have to exist, but I’m glad it does,’ says Kyran O’Mahoney, founder of Nexus Inclusion.
It’s “annoying”, Kyran O’Mahoney admits, that the millions that live with disabilities have a real expectation that technology won’t work for them. “There is something fundamentally broken [in society]” that we don’t consider them.
By not providing accessible services, businesses are excluding millions from their addressable market. “It makes no financial sense not to do this”, he says.
“Ultimately you say ‘you have to do it, it’s the law’, right? If you do it, you’re going to make more sales and drive more revenue. But come on, it’s also just the bloody right thing to do.”
Accessibility audits happen, but reports are often tossed to the side by teams that don’t understand how to implement the recommended changes, O’Mahoney says, speaking to SiliconRepublic.com ahead of Nexus Inclusion’s new product launch on 25 May.
Nexus’ product launch is scheduled just days after the Global Accessibility Awareness Day today (21 May).
According to the World Health Organisation, an estimated 1.3bn people or around 16pc of the population lives with disabilities. But realistically, O’Mahoney says, it’s higher than that, if you take into account, for example, elderly people, or those with temporary disabilities.
In Ireland people living with disabilities make up around 22pc of the population, according to Employers for Change.
Meanwhile, one global survey from 2025 reported that 84pc of its respondents (comprising software developers, engineers and legal professionals) said digital accessibility is a key priority for their company. Reality, however, seems to be far different.
Statistics also suggest that 96pc of the world’s top 1m websites are not accessible to people with disabilities, and around 71pc of users with disabilities exit inaccessible websites.
The National Disability Authority finds that websites in Ireland only have an average accessibility score of around 55.2pc – all translating to loss in income for businesses.
O’Mahoney founded Nexus Inclusion in 2024 to tackle this issue, and a year after its official launch in 2025, he claims to have built a “first” in the digital accessibility space with a new AI-powered tool.
Affordability and ease of use are two factors O’Mahoney’s team focused on while building their AI tool, he says. It’s a “harsh reality” that digital accessibility is a hard thing to do. “And that’s why it gets pushed out”.
The start-up’s AI tool allows for continuous compliance detection across websites, digital products, and video and other media. The product conducts automated audits and guides users to fix any issues.
O’Mahoney says that the easy-to-use tool is designed for those who do not understand digitally accessible design. While the start-up is also tackling product pick-up by reducing prices to target small websites, all the way up to SMEs.
Nexus Inclusion raised €2m last summer, followed by an additional €1.5m towards the end of last year and early this year.
O’Mahoney says that the product was received positively following a stealth launch earlier this year. “There’s a real demand out there for people that want to be accessible”.
The start-up currently employs eight and is planning to hire around five to seven across technology, digital accessibility and sales this year.
A multi-fold problem
The fact that accessibility had to be legally mandated is a bit “annoying”, O’Mahoney tells me. “I wish [the European Accessibility Act] didn’t have to exist, but I’m glad it does.”
However, in some small parts, the digital accessibility gap is also exacerbated by a lack of awareness among people both living with and without disabilities.
“The number one thing is the people don’t know that the technology exists to support them or create that independence.”
This is where accessibility coaches play a significant role in coaxing a somewhat apprehensive community, wary of technology that largely excludes them in the making, in picking up these tools.
Companies such as Nexus Inclusion, meanwhile, are attempting to tackle the flip side of the issue by ensuring businesses, at the minimum, stay compliant with accessibility laws.
“We’re all different. We all have different things going on in our lives, whether they’re temporary or permanent, and I think it’s a much better way to look at – if we look at product design – [that] everyone is going to use it differently.”
O’Mahoney says that such issues could be better targeted in a diverse workplace, but “statistically, people with disabilities tend to be unemployed.” The disability employment rate in Ireland stands at just upwards of 32pc, nearly 20pc lower than the EU average of 51.3pc.
O’Mahoney, who was born with just 17pc vision, previously worked at Vision Ireland as its group chief technology officer. In 2021, he founded Inclusion and Accessibility Labs, an IT consulting company, which he also led as CEO.
“Advocacy around this space is growing,” he says. “Plus there’s more and more people identifying that they have somewhat of a disability now, because it’s not considered a shameful thing anymore – which I think is wonderful.”
Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.
Tech
Taiwan is cracking down on AI chip smuggling
![]()
Prosecutors say the three suspects attempted to bypass those controls by submitting fraudulent declarations about the equipment’s final destination. In a statement, the Taiwan Keelung District Prosecutors’ Office said the defendants “fully knew” that sales of the servers to China are “strictly regulated” by the US. Still, they allegedly proceeded…
Read Entire Article
Source link
-
Crypto World6 days agoBloFin War of Whales 2026 Grand Prix opens registration for $5M trading championship
-
Fashion6 days agoWeekend Open Thread: Theory – Corporette.com
-
Crypto World6 days agoE-Estate Announces 1 Year Live: Washington DC Summit as Real Estate Tokenization Enters Its Next Phase
-
Tech7 days agoTech Moves: Microsoft AI leader jumps to OpenAI; former AI2 exec joins Meta; and more
-
Tech6 days agoGoogle reimburses Register sources who were victims of API fraud
-
Business6 days agoH&R Real Estate Investment Trust (HR.UN:CA) Q1 2026 Earnings Call Transcript
-
Sports6 days agoNapoleonic enters 2026 Doomben 10,000 field via Abounding withdrawal
-
Crypto World6 days agoBeInCrypto 100 Institutional Awards Nomination: KAST for Best Digital Assets Neobank and Best Digital Assets Fintech
-
Crypto World6 days agoBitcoin Battles US Bond Nerves With BTC Price Dip Toward New May Lows
-
Crypto World6 days agoICE and CME urge US regulators to curb Hyperliquid energy trading
-
Crypto World6 days agoWall Street’s Boldest Gold Prediction Has Russians Rushing to Buy
-
Fashion5 days agoOn the Scene at Gucci’s Cruise Show in New York City: Mariah Carey, Kim Kardashian, Lindsay Lohan, Iman, and More!
-
Entertainment6 days agoDavid Letterman Returns to Late Show, Blasts Cancellation
-
Crypto World6 days agoIREN closes $3 billion convertible notes deal amid AI infrastructure expansion
-
Politics7 days agoDWP PIP Timms review continues to be an absolute farce
-
Fashion5 days agoTrending Western Style Vests Perfect for Summer
-
Politics5 days agoWatch: far-right flag-fanatics run over victim, attack locals – Setup By the Left wing for your entertainment
-
Crypto World7 days agoLido Finance Selects Chainlink CCIP as the Official Cross-Chain Infrastructure for wstETH Security
-
Fashion6 days agoCreative Ideas for Custom T-Shirts
-
Fashion5 days agoAmazon Sundays: Memorial Day Hosting


-front-doors-closed-Reviewer-Photo-SOURCE-Louryn-Strampe.jpg)
%2520front%2520open%2520and%2520closed%2520SOURCE%2520Martin%2520Cizmar.jpg)
You must be logged in to post a comment Login