TERG scientists also developed a different 3D-implant innovation to heal spinal injuries last year.
Researchers from the RCSI University of Medicine and Health Sciences have developed a new 3D implant solution that helps heal spinal cord injuries.
Their study, published in the journal Bioactive Materials, shows how a 3D implant designed to copy the structure and stiffness of the spinal cord – combined with tiny, growth-promoting particles engineered to carry RNA – can help regrow nerve cells.
The study was led by researchers at RCSI’s Tissue Engineering Research Group (TERG) and Amber, the Research Ireland Centre based in Trinity College Dublin.
Advertisement
It was supported by the Irish Rugby Football Union Charitable Trust and Research Ireland, with additional funding from the UK’s Anatomical Society and the Irish Health Research Board.
Spinal cord injuries can often result in permanent paralysis caused by damaged neurons in the central nervous system that have a very limited capacity to regrow. According to RCSI, while implants can provide physical support at the site of the injury, nerve cells generally face molecular barriers that prevent regrowth.
RCSI scientists are trying to overcome this with a multifunctional implant that supports regenerating tissue while also delivering RNA-based signals that encourage neurons to switch their growth mechanisms back on. These signals target and silence a gene called PTEN that suppresses neuron regrowth after injury.
“We’ve created an environment that both physically and biologically re-enhances the regenerative capacity of injured neurons, which is a key requirement for restoring function after spinal cord injury,” said Prof Fergal O’Brien, the deputy vice-chancellor for research and innovation at RCSI.
Advertisement
“In laboratory models of spinal cord injury, neurons exposed to the RNA-activated implant showed significantly enhanced growth,” he added. O’Brien is a professor of bioengineering and regenerative medicine, and the head of TERG.
Dr Tara McGuire, who carried out the research as a PhD student in TERG, added: “While this study focused on laboratory models, the next steps will to be to test the approach in vivo and explore how RNA-activated biomaterials could help bridge damaged spinal cord tissue and restore lost connections.”
TERG scientists came up with a different innovation to heal spinal injuries last year, integrating nanomaterials into a soft, gel-like structure to stimulate neuron and stem cell growth.
Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.
If you’re an avid Makita user, you’re probably already aware that the tools manufacturer offers loads of must-have accessories and attachments to fit your every need. Tool accessories can include all kinds of things, from power tool attachments or components to mini organizers, and even some smaller hand tools. They can be as simple as something you need to make using your tools easier, or in some cases, something that totally overhauls what your device usually does.
What you might not know, though, is that you can make a substantial number of them yourself with just some filament and access to a 3D printer. Whether you have a set-up ready at home to dive into your own printer projects, or regularly hang around your local makerspace, you might be surprised by just how much you can pad out your collection with a few simple projects. And, with online 3D printing communities like Thingiverse or Printables, you don’t have to worry about designing your own gear from scratch — unless you really want to, that is.
Some accessories users have come up with and shared the blueprints to show some real ingenuity. They do this by offering nifty storage solutions that help you make the most of your space, practical hacks for keeping easy-to-lose tool attachments nearby while you’re working, and sometimes, by even overhauling what you use your Makita product for. In some cases, you’ll need a few extra pieces to finish off your project, like screws, nuts, or bolts, but for the most part, you can let your 3D printer do the magic.
Advertisement
Makita MakPac trolley attachment
Moving around a Makita MakPac is no small feat once it’s full of heavy tools or equipment. Why not make your life a little easier by putting it on wheels? StainlessMike’s neat 3D printer project makes it possible for you to do just that by giving you the components to build your own wagon. You can use the Printables project to manufacture four sections, which make up each corner of the wagon. Then, once they’re printed out, you can fit them together and finish them off with a few extra components.
Advertisement
Besides the 3D printed base, you’ll also need a few other things. That includes a few screws and nuts for fixing your printed creation together securely, alongside some wheels, washer plates, and any fixings you need for your wheels of choice. Once you’ve grabbed those, you’ll want a 3D MakPac Clip to help keep your trolley secure as you wheel it around.
Another thing you’ll want to keep in mind when building your trolley is what kind of filament to print with. According to the project page on Printables, you’re going to need to keep in mind where you primarily plan on using your trolley when you choose what kind of material to use. If you want to use your trolley mostly indoors, like in your garage or home studio, then you’d probably be best off using a polyactide (PLA) filament, as it can be easier to use for this project. However, if you need a sturdy build for regular use on rough or uneven surfaces, then a PETG material is recommended instead.
Advertisement
Makita magnetic bit holder
It’s easy to lose track of just the drill bit you need, especially when it’s right when you need it. And, it’s frustrating when your drill bit is just out of reach during a tricky or fiddly project. A 3D printed drill bit holder could be just the fix you need to keep everything you need close by.
Printables user Jonathan_29983 shared a simple but effective solution for keeping ahold of all your Makita drill bits at once with the power of a couple of magnets. The holder fits onto the left side of the base of your cordless Makita drill to make room for five different drill bits all at once. Perhaps the smartest part of the project is that the drill bits are then magnetically held in place, meaning you don’t have to worry about dropping them as you do your DIY.
After you’ve finished 3D printing the holder itself, you’ll need a few other components. But, thankfully, they’re all easy enough to get a hold of, and should be easy to add. You’ll need to grab a couple of M4 14-millimeter screws to help secure your holder, and a couple of 6-by-3-millimeter magnets. All you have to do to finish it off is assemble it correctly, and you have a cheap and easy drill bit holder to attach directly to your drill.
Advertisement
Pegboard holder for Makita 18V battery
There are all kinds of easy DIY storage options for organizing your tools, and one versatile, cheap, and fairly stylish option is a pegboard. You can hang it on your wall to display your tools, so you always know what you have and where you last put it. One challenge you might face using the pegboard organization method is figuring out exactly how to attach your tools to it — especially in the case of any larger, heavier, or more cumbersome items, like a battery charger.
Advertisement
BioGuyGone3D’s homebrew Makita accessory offers a pegboard mount designed to support Makita 18 volt battery chargers. Both the DC18RC and DC18RA models are compatible with the project. It’s a straightforward build that only needs a couple of extra parts — a couple of M3 10-millimeter or 12-millimeter screws — to bolt it together. It also comes in two different designs, one rounded and one rectangular, for you to choose from. If you’re an especially deft builder, you can also remix the design to make small tweaks so it fits exactly what you’re looking for.
The size and weight of battery chargers make it more difficult to know how to store them, since they won’t easily hang without the right accessories or tools. However, that’s also the same reason why it’s so useful to have options to hang it securely out of the way. After all, it can easily take up a lot of space in a drawer or on a workbench when you aren’t even using it. As a result, accessories like this one are especially handy.
Advertisement
Gridfinity base plate for Makita Makpac
If you’ve been on your 3D printing journey for long, then you might have already heard of Gridfinity. In case you haven’t, Gridfinity is a 3D printed storage system with a slight twist: it’s completely open source and modular, meaning you can design your own storage system to fit your exact needs. Sites like Thingiverse and Printables have tons of users making their own Gridfinity-compatible builds, and perhaps unsurprisingly, many of them are designed to help keep your toolboxes organized to a T.
Makita is no exception to the trend, with a decent number of Gridfinity projects designed for use with Makita products kicking around sites like Printables. Guto’s Makpac base plate is a particularly clever accessory, as it allows you to transform your case into an organizer that you can fit any other Gridfinity projects directly into. The baseplate effectively works as a liner that helps to keep other 3D printed items in place, which you can then use to organize anything you want.
The base plate isn’t the only Makita accessory designed for use with the Gridfinity system, either. Other users have also designed components for the modular organizer that could be slotted into the base plate, if it fits into your Makpac. A few examples include a knife and razor block, battery storage grids, and trays for larger tools like drills and grinders. And, of course, you could fit any other non-Makita themed Gridfinity builds to store your other tools and components in your Makpac alongside your Makita tools.
Advertisement
Makita 18V battery lantern
This quirky 3D printer project transforms your Makita 18V battery into a portable lamp ideal for working off-the-grid or using as a useful gadget for your next camping trip. Using Widerporst’s Thingiverse project, you can print out an attachment to assemble with a handful of other parts, like a lamp socket, battery plate, and a suitable bulb, to make your own Makita light fitting. Just make sure you pick up the right kind of bulb, so the Makita battery’s voltage limitation does its magic. Transforming your Makita battery into a portable lantern isn’t the easiest 3D printing project, but it could make for a fun experiment for intermediate creators. Plus, it makes for a fun way to brighten up your garage, or to keep a light going while you’re doing a major home renovation project.
Advertisement
Not so sure about turning your Makita battery into a lamp specifically? You can grab other, similar 3D printed accessories to turn it into something else. In fact, the core idea for the battery lantern actually came from other 3D printed battery mounts. Usually, batteries like these are designed to provide a power supply to cordless tools like drills. Battery mounts make it possible to give your batteries a new lease of life by making them a compatible power source for all kinds of other fun DIY projects, instead of being exclusive to power tools — much like this battery lantern. So, if you 3D print the right mount, you can repurpose your Makita battery for all kinds of different projects.
Duckbill, the consulting firm that Quinn co-founded with Mike Julian, is making what amounts to a high-stakes pivot: transforming into a software company with a new platform called Skyway that aims to make cloud spending more predictable for large companies.
The company, based in San Francisco, announced $7.75 million in funding from Heavybit, Uncork Capital, and Encoded Ventures to accelerate product development and grow its 10-person team.
Their contrarian pitch: the cloud cost management sector, commonly known in the industry as FinOps, is fixated on making bills smaller, when the real problem is that nobody can predict what the costs will be next month.
Advertisement
“Finance doesn’t lose sleep over whether your cloud bill is $1 million or $100 million,” Quinn said in a news release. “They lose sleep when it jumps 30% and nobody can explain why.”
Julian, Duckbill’s CEO, said in an interview that the company came to realize that existing cloud cost management tools are built by startups, for startups, for the most part. Many of Duckbill’s large enterprise clients had tried those tools, rejected them, and ended up building their own.
“I have a hypothesis that the people building in FinOps today come from startups and not from enterprise, so they don’t even know many of the problems exist,” Julian said.
Duckbill’s clients, which include companies such as Airtable, Ticketmaster, and New Relic, spend $70 million a year on cloud infrastructure, on average. (Tagline for their consulting business: “Cloud cost management for the nine-figure club.”) That’s well above the $1 million annual minimum that AWS requires for a private pricing contract. At that scale, Julian said, you start to see patterns and problems that don’t exist for smaller companies.
Advertisement
All told, the company says it has negotiated tens of billions of dollars in cloud contracts, giving it unique insights. (“Our schlep is our moat,” reads one of its internal whiteboards.)
Skyway’s first module, called Contract Manager, converts private pricing deals into structured data, validating that customers are getting discounts they negotiated, and projecting spending.
The bigger vision extends well beyond AWS. Duckbill started with a specialization in Amazon’s cloud platform but has expanded into Google Cloud and Microsoft Azure. Julian said the ultimate goal is to structure spending data across every piece of software and infrastructure a company uses: SaaS tools like Datadog and Snowflake, AI providers like Anthropic and OpenAI, and even legacy data centers for customers still using their own mainframes.
Julian acknowledged that the pivot into software will eventually cannibalize a portion of Duckbill’s consulting business, but said he doesn’t expect it to disappear entirely. Big companies need services, he said, pointing to companies like ServiceNow and CrowdStrike that built major software businesses while maintaining significant services revenue.
Advertisement
The market for cloud cost management technology is crowded, and difficult. The latest casualty: Spokane-area startup Vega Cloud, which entered receivership after raising millions in financing.
But Julian contends that it’s not really one market. Companies like Point5 focus on workload optimization. Others like Finout specialize in cost allocation. He sees Duckbill as doing something different: building financial planning and forecasting software for infrastructure.
Duckbill isn’t using artificial intelligence in its own product yet. This will not surprise anyone familiar with Quinn’s aversion to industry hype. However, by bringing structure to messy spending data, Skyway is positioned to create what Julian calls “AI candy” — clean, labeled information that customers can put to use in their own systems.
At the same time, AI is making it harder to predict cloud costs.
Advertisement
“Cloud spend is already one of the largest and least predictable line items in the enterprise,” said Joseph Ruscio, general partner at Heavybit, one of the firms backing Duckbill’s pivot, in the press release announcing the funding. “AI infrastructure is about to compound that volatility.”
Duckbill currently has 10 employees and plans to grow to 15 by the end of the current quarter and 20 by year-end, with most of the new hires in engineering. The company also hired Jim Moses, who previously worked at AWS as a private pricing negotiator, as director of hyperscaler strategy, essentially putting someone from the other side of the table on their team.
It’s not the first time Quinn and Julian have tried to build a product. In 2022, Duckbill attempted to make the leap from services to software. It was an “abject failure,” as Quinn acknowledged in a video discussion with Julian, released by the company as part of the announcement.
“Turns out that if you just assume you know what customers want and don’t talk to them, you’re gonna go somewhere, but not where you wanted to go,” he said.
Advertisement
In addition to its website, Quinn noted, Duckbill can be reached at 833-AWS-BILL.
With an Apple experience on March 4, the rumor mill is in overdrive. These are the best candidates — and the also-rans — for what Apple will launch and then have an “experience” to demo on March 4.
The more likely Apple launches for early March
It seems the March 4 Apple Experience won’t be an actual launch of new products in Apple’s catalog, but instead capping off multiple announcements during the week. That gives Apple a lot of opportunity to promote multiple items. With the breadth of rumored devices on the docket, including many anticipated for launch in early 2026. it certainly needs that opportunity. But, as ever, some have more chance of making an appearance than others. Continue Reading on AppleInsider | Discuss on our Forums
The European Parliament has taken a rare and telling step: it has disabled built-in artificial intelligence features on work devices used by lawmakers and staff, citing unresolved concerns about data security, privacy, and the opaque nature of cloud-based AI processing.
The decision, communicated to Members of the European Parliament (MEPs) in an internal memo this week, reflects a deepening unease at the heart of European institutions about how AI systems handle sensitive data.
The Parliament’s IT department concluded that it could not guarantee the safety of certain AI-driven functions, notably writing assistants, text summarization tools, virtual assistants, and web page summary features, because they rely on cloud-based processing that sends data off the device.
In a workplace where draft legislation, confidential correspondence, and internal deliberations circulate daily, even momentary exposure of sensitive information is viewed as unacceptable.
Advertisement
For now, the measures apply only to these native, built-in AI features on Parliament-issued tablets and smartphones, not to everyday apps like email or calendars. The institution has declined to specify which operating systems or device manufacturers are affected, citing the “sensitive nature” of cybersecurity matters.
The internal memo did more than announce a software rollback. It advised lawmakers to review AI settings on their personal phones and tablets, warning them against exposing work emails, documents, or internal information to AI tools that “scan or analyze content,” and urging caution with third-party AI applications that seek broad access to data.
This guidance implicitly acknowledges a larger truth: for many elected officials and staff, the boundary between official and personal devices is porous. The Parliament’s approach underscores that risks are not confined to issued hardware but extend into the consumer technology choices of its own members.
The move is the latest in a series of precautionary steps by EU institutions. In 2023 the Parliament banned the use of TikTok on staff devices over similar data concerns, and ongoing debates have questioned the use of foreign-developed productivity software. Some lawmakers have even suggested moving away from Microsoft products in favor of European alternatives, part of a broader push for digital sovereignty.
That push is not abstract. The EU’s Artificial Intelligence Act, the world’s first comprehensive regulatory framework on AI, has been in force since 2024 and imposes obligations on AI providers and users alike, categorizing systems by risk and demanding transparency, traceability, and human oversight.
Advertisement
Yet the Parliament’s latest action reveals a paradox: while Europe seeks to regulate and shape AI at scale, it is simultaneously wary of the very tools it aims to master. Stopping short of a full ban on AI use, the institution is essentially saying that in certain contexts, the technology is too unpredictable to trust, especially when critical information could leak outside secure boundaries.
What this means for EU tech policy
The Parliament’s decision may seem narrowly targeted, but it carries broader implications. It signals that even for progressive regulators who have championed innovation alongside rights protections, the practical limits of AI integration are now a central concern. Cybersecurity teams within government institutions are not merely technologists; they are custodians of trust in an era when data is both an asset and a vulnerability.
For businesses and citizens watching Europe’s regulatory trajectory, this episode is instructive. It suggests that the EU’s approach to AI will not only be legal and ethical but deeply pragmatic. Regulations may promote responsible innovation, but European institutions are prepared to pull back when security and control are at stake.
As AI capabilities continue to evolve and become embedded in devices worldwide, the Parliament’s cautionary step highlights a core tension of the digital age: balancing the potential of AI with its unseen and unquantified risks.
Advertisement
Whether other governments follow suit, or whether this stance influences corporate and product strategy, remains to be seen. In the meantime, the message from Brussels is unmistakable: when it comes to AI and sensitive data, trust but verify is no longer enough.
Etsy has been growing at a slowed pace in recent years. It bought Depop for $1.6bn, and sold it at a loss.
eBay is acquiring second-hand fashion marketplace Depop from Etsy in a bid to reach a younger, more “fashion-forward” resale-savvy customer-base. The deal is valued at approximately $1.2bn, expected to close in Q2 this year.
A sleeper hit among younger generations, Depop has around 7m active buyers – nearly all Gen Zs and Millennials under the age of 34 – and more than 3m active sellers. The platform recorded around $1bn in gross sales in 2025, a 60pc year-over-year growth in the US.
Depop competitor ThredUp reported that the US second-hand apparel market grew from $28bn in 2019 to $56bn just last year. While other analysts place the global second-hand fashion market at $210bn in 2025, expected to grow to more than $580bn by 2035.
Advertisement
Second-hand fashion is gaining traction among larger swathes of younger consumers looking for more affordable clothing. A 2025 analysis of fast fashion prices found an average rise of $17 across key categories of clothes in the US, with jackets and outerwear prices rising by 24pc.
Meanwhile, Business Insider finds that the fashion industry contributes to around 10pc of global carbon emissions annually, led by brands such as Shein and Zara. For eBay, fashion sales represents an annual gross merchandise volume of more than $10bn.
Etsy purchased Depop for $1.6bn in 2021. The same year, it bought Brazilian online marketplace Elo7 for $217m. In 2019, it purchased music gear marketplace Reverb. Since then, it has sold all three of them.
The 2005-found company has been seeing slowed growth in recent years. Its year-over-year revenue grew by just 2.2pc in 2024, down from 7.1pc in 2023.
Advertisement
Etsy chief executive said that the Depop sale allows the company to focus growing its core marketplace. It plans to use the sale proceeds for general corporate purposes, continued share repurchases and investment in its core marketplace.
“Depop has built a trusted, social-forward marketplace with strong momentum in the pre-loved fashion category, and we are confident that as part of eBay, Depop will be even more well-positioned for long-term growth, benefiting from our scale, complementary offerings, and operational capabilities,” said eBay chief Jamie Ianonne.
OpenAI has partnered with India’s Tata Group to secure 100 megawatts of AI-ready data center capacity in the country, with plans to scale to 1 gigawatt. The move is part of a broader push to deepen the company’s enterprise and infrastructure footprint in one of its fastest-growing markets.
OpenAI announced on Thursday that the partnership with the Tata Group is part of its Stargate project, which aims to build AI-ready infrastructure and expand enterprise adoption globally. OpenAI will become the first customer of Tata Consultancy Services’ HyperVault data center business, beginning with 100 megawatts of capacity. The deal also includes deploying ChatGPT Enterprise across Tata’s workforce and standardizing AI-native software development through OpenAI’s tools.
The partnership, which falls under the “OpenAI for India” initiative, highlights the company’s expanding footprint in the country, which according to recent estimates from CEO Sam Altman has more than 100 million weekly ChatGPT users spanning students, teachers, developers, and entrepreneurs. The scale of adoption has positioned India as one of OpenAI’s most important growth markets as it deepens enterprise and infrastructure investments in the country.
The local data center capacity will allow OpenAI to run its most advanced models within India, reducing latency for users while meeting data residency, security, and compliance requirements for regulated sectors and government workloads. Hosting compute domestically is critical for enterprises that handle sensitive data and operate under data localization and digital infrastructure rules. These circumstances could widen OpenAI’s access to enterprise customers that require in-country processing.
Advertisement
An initial 100 megawatts of capacity represents a substantial commitment in the context of AI infrastructure, where large-scale model training and inference require power-hungry clusters of graphics processing units, or GPUs. Scaling to 1 gigawatt over time would place the Tata facility among the largest AI-focused data center deployments globally, underlining the scale of OpenAI’s long-term ambitions in India.
Beyond infrastructure, OpenAI and Tata Group will pursue a strategic enterprise collaboration aimed at accelerating AI adoption across Tata’s businesses. The conglomerate plans to roll out ChatGPT Enterprise to its workforce over the coming years, beginning with hundreds of thousands of employees at Tata Consultancy Services (TCS), in what would rank among the largest enterprise AI deployments globally. TCS also intends to use OpenAI’s Codex tools to standardize AI-native software development across its engineering teams.
N Chandrasekaran, chairman of Tata Sons, said OpenAI’s partnership would help build “state-of-the-art AI infrastructure in India” while supporting efforts to skill the country’s workforce for the AI era.
Techcrunch event
Advertisement
Boston, MA | June 23, 2026
Financial terms of the deal were not disclosed, including whether OpenAI is making a capital investment in HyperVault or leasing capacity.
Advertisement
In November 2025, TCS secured backing from private equity firm TPG to develop AI-ready infrastructure in India under its HyperVault data center business. The platform is backed by about ₹180 billion (about $2 billion) in planned investment and is designed to support large-scale compute workloads for hyperscalers and enterprise customers.
OpenAI will also expand its certification programs in India, with TCS becoming the first participating organization outside the United States. The certifications are designed to help professionals build practical AI skills across roles and industries, the company said. The move follows OpenAI’s recent partnerships with leading Indian institutions in engineering, medicine, and design.
OpenAI plans to open new offices in Mumbai and Bengaluru later this year, adding to its existing presence in New Delhi as it deepens operations in the country. The expansion is expected to support enterprise partnerships, developer engagement, and local regulatory coordination as the company scales its footprint in India.
The announcement comes as India hosts its AI Impact Summit in New Delhi, where global AI leaders, including Sam Altman, Anthropic CEO Dario Amodei and Google CEO Sundar Pichai are participating alongside Indian startups and enterprises showcasing AI applications across sectors such as finance, healthcare, and education.
Advertisement
OpenAI has been expanding its presence in India through partnerships with companies including Pine Labs, JioHotstar, Eternal, Cars24, HCLTech, PhonePe, CRED, and MakeMyTrip, as it seeks to embed its models across consumer platforms, enterprise systems and digital payments infrastructure in one of the world’s largest internet markets.
Together, the data center build-out, enterprise deployments, and expanding partner ecosystem signal OpenAI’s most comprehensive push yet to anchor advanced AI infrastructure and applications in India.
A roll of Scotch tape can do some truly unexpected things, such as completely replacing a camera lens. Maker okooptics puts this to the test in a recent project, transforming an ordinary sensor into a functioning camera using only Scotch tape, smart rigging, and some math after the fact.
Lensless imaging works on a fairly simple principle: light from a scene strikes the sensor in all directions rather than in a focused beam. Traditional lenses perform the job by bending light to create precise projections, but in this case, the Scotch tape diffuses the light in a predictable way, spreading each point in the scene across the sensor in what’s known as a point spread function, or PSF. The raw grab is a confused mess, yet the information is still contained inside it.
Capture Stunning Footage – This vlogging camera features a 1-inch CMOS sensor and records in 4K resolution at an impressive 120fps. Capture…
Effortlessly Frame Your Shots – Get the ideal composition with Osmo Pocket 3’s expansive 2-inch touch screen that rotates for both horizontal and…
Ultra-Steady Footage – Say goodbye to shaky videos. Osmo Pocket 3’s advanced 3-axis mechanical stabilization delivers superb stability. Enjoy smooth…
He starts with a Raspberry Pi camera and puts a small piece of Scotch tape around a 3D printed bit only 3 millimeters away from the sensor. A piece of electrical tape holds the tape in place and creates a frame for the image, ensuring that no PSF escapes and causes additional difficulties. Only 3mm was the sweet spot since it kept the PSF nice and small in the center of the sensor, which is where you want it for optimum results.
You set it up, point it at a subject, such as a cat, smartphone screen with text, or a turtle silhouette, and capture the shot. The sensor then catches the dispersed light field, which means there’s no need to mess with manual focus or particular exposure settings because everything is handled by the computer.
The magic happens during reconstruction, which uses a technique known as Wiener deconvolution. That’s because the PSF wiped out the true scene, resulting in the hazy image. In the Fourier domain, the convolution converts to a very easy multiplication, so all you have to do is divide by the PSF’s Fourier transform. However, there’s a catch: all that noise in the image causes issues. Wiener deconvolution adds a little extra math to balance out the noise, resulting in a cleaner image if the settings are correct. [Source]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.
Discovered by researcher Souvik Kanda and tracked as CVE-2026-1670, the security issue is classified as “missing authentication for critical function,” and received a crtical severity score of 9.8.
The flaw allows an unauthenticated attacker to change the recovery email address associated with a device account, enabling account takeover and unauthorized access to camera feeds.
“The affected product is vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the “forgot password” recovery email address,” CISA says.
According to the security advisory, CVE-2026-1670 impacts the following models:
Advertisement
I-HIB2PI-UL 2MP IP 6.1.22.1216
SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0
PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0
25M IPC WDR_2MP_32M_PTZ_v2.0
Honeywell is a major global supplier of security and video surveillance equipment with a broad range of CCTV camera models and related products deployed in commercial, industrial, and critical infrastructure settings worldwide.
The company offers many NDAA-compliant cameras that are suitable for deployment in U.S. government agencies and federal contractors.
The specific model families named in CISA’s advisory are mid-level video surveillance products used in small to medium business environments, offices, and warehouses, some of which may be part of critical facilities.
CISA stated that as of February 17th there were no known reports of public exploitation specifically targeting this vulnerability.
Nonetheless, the agency recommends minimizing network exposure of control system devices, isolating them behind firewalls, and using secure remote access methods such as updated VPN solutions when remote connectivity is necessary.
Advertisement
Honeywell has not published an advisory on CVE-2026-1670, but users are advised to contact the company’s support team for patch guidance.
Modern IT infrastructure moves faster than manual workflows can handle.
In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
Hubble has just discovered one of the darkest galaxies known to exist. It’s named Candidate Dark Galaxy-2, or CDG-2 for short. This faint object is located in the Perseus galaxy cluster, around 300 million light years from Earth.
Most galaxies announce their presence with a dazzling display of illumination, but CDG-2 does the opposite, with hardly no light seen at all. It’s composed of approximately 99% dark matter, a mysterious, invisible substance that drags objects with its gravity but cannot be seen. The remaining 1% is merely ordinary matter, although even that appears scarce and dull.
Superior Optics: 400mm(f/5.7) focal length and 70mm aperture, fully coated optics glass lens with high transmission coatings creates stunning images…
Magnification: Come with two replaceable eyepieces and one 3x Barlow lens.3x Barlow lens trebles the magnifying power of each eyepiece. 5×24 finder…
Wireless Remote: This refractor telescope includes one smart phone adapter and one Wireless camera remote to explore the nature of the world easily…
A team of researchers at the University of Toronto, led by David Li, discovered CDG-2 by using an innovative method. They were looking for compact, tightly packed globular clusters, which are large, ancient balls of stars that can stick together even in the most chaotic settings. Their computer calculations suggested that there might be hidden galaxies in there, and Hubble provided images that confirmed them correct.
Hubble’s high-resolution images revealed four of these globular clusters clumped together, as well as a faint light surrounding them, very definitely indicating the presence of an underlying galaxy. Then, after more observations of the glow from the Euclid satellite observatory and the Subaru Telescope in Hawaii, it was obvious that the clusters belonged to a single extremely faint galaxy.
CDG-2 actually shines with the brilliance of around 6 million suns at its peak, but this is spread out over a large area. The five clusters account for approximately 16% of the light we can see, with the remainder coming from a collection of extremely faint, scattered stars. To put that into context, the Milky Way has far more of these little globular clusters, as well as a lot more light from all of its billions of stars.
Advertisement
CDG-2 most likely lost much of its gas, the substance that allows stars to form in the first place, due to being located in such a busy area of the cosmos, the Perseus Cluster. This discovery demonstrates how important globular clusters may be in detecting other galaxies that might otherwise go unreported, and low light emitters like CDG-2 challenge our understanding of how galaxies develop, particularly in crowded areas of the universe.
Travelling Abroad: Tech for Secure Internet Access
International travel pushes you into networks you don’t control, jurisdictions you may not understand, and recovery paths that fail at the worst time. Secure access abroad is engineered through layers: reduce exposure, encrypt what you must transmit, and pre-stage recovery so you can recover from lockouts or device loss without improvising.
1) Start with a travel threat model (5 minutes, worth hours)
Before you pack, decide which profile you’re in:
Advertisement
Low risk: tourism + casual accounts (streaming, social, personal email).
Medium risk: business travel (corporate email, client files, admin panels).
High risk: journalism/activism, sensitive IP, or destinations with aggressive filtering.
This choice determines how far you go (e.g., one device vs two, hardware keys vs app MFA, and whether you bring a “clean” travel laptop).
Field rule
If losing your phone would lock you out of email, you’re not ready to travel.
2) Account resilience (the layer most people skip)
Most travel “security failures” are availability failures: you get locked out when your bank flags a foreign login, your SIM stops receiving texts, or your authenticator is on the phone you just lost.
Do this before you leave
Enable MFA on primary accounts (email first, then password manager, then banking).
Add at least two independent second factors (e.g., authenticator app + hardware key, or authenticator app + backup codes).
Print or securely store backup codes for critical accounts.
Google’s own account recovery option guidance is explicit: create backup codes specifically for cases where you lose your phone, change numbers, or can’t receive codes via text/call/Google Authenticator. Google also states that backup codes are one-time use, and that generating a new set of 10 codes automatically deactivates the old set.
Backup codes: operational best practice
Store one copy with the physical travel documents and another in a secure vault accessible offline.
Treat backup codes like cash: Google explicitly warns against sharing them and notes That It never asks for a backup code except at sign-in.
When NOT to rely on SMS MFA
SMS can fail abroad for mundane reasons (roaming, SIM replacement, blocked messaging), and it creates fragile recovery chains; use it only as a fallback, not your primary plan.
3) Device hardening (reduce what can be stolen, not just what can be sniffed)
Think “travel device = elevated-risk endpoint.”
Minimum viable hardening (fast, high impact)
Update the OS, browsers, and security tooling before departure (don’t perform major upgrades mid-trip unless necessary).
Remove unused apps; revoke tokens/sessions for apps you don’t need.
Turn off auto-join for Wi‑Fi; disable Bluetooth/NFC when you’re not using them.
Use full-disk encryption and a strong passcode; avoid “easy unlock” shortcuts that trade away physical security.
If you handle sensitive work
Use a dedicated travel profile or device with minimal data.
Keep “source of truth” documents in encrypted storage with explicit offline copies for travel essentials (IDs, itinerary, emergency contacts).
4) Networks: prefer “known-good paths,” not “free Wi‑Fi”
Public Wi‑Fi is convenient, but it is also the most common place to encounter rogue access points, captive portal manipulation, and opportunistic monitoring.
NSA guidance explicitly recommends avoiding public Wi‑Fi and using a personal/corporate hotspot with strong authentication/encryption when possible; if you must use public Wi‑Fi, use a VPN to encrypt traffic.
Advertisement
Practical network priority order
Your phone hotspot (or a dedicated travel router with a trusted SIM/eSIM)
Corporate-managed connectivity (if provided)
Hotel Wi‑Fi only when necessary
Airports/cafés as a last resort
Wi‑Fi hygiene that prevents dumb losses
Confirm the SSID with staff (don’t guess).
Don’t install “helper apps” required by a captive portal.
After connecting, forget the network when you’re done (prevents silent auto-reconnect later).
5) VPNs as a core layer (configured like an engineer, not a tourist)
A VPN is useful because it reduces what local networks can observe or tamper with, but it doesn’t magically make unsafe behavior safe.
What to look for (2026 buyer/operator criteria)
Modern protocols (WireGuard/OpenVPN), stable clients on your OS, and predictable reconnect behaviour.
Kill switch / “block without VPN” mode to prevent accidental cleartext if the tunnel drops.
Obfuscation/stealth options if you expect active filtering.
Multi-region redundancy and a plan B provider (because “it worked yesterday” is not a plan).
VPN pitfalls (common, expensive)
Split tunnelling can leak DNS or app traffic if misconfigured; only use it when you have a tested reason.
“Always-on VPN” can break banking apps or corporate SSO flows; test your critical apps before departure.
If a country restricts VPNs, blindly installing random VPNs can create legal and personal risk—research your destination’s rules and your organisation’s policy. If you’re travelling to heavily filtered regions, review destination-specific guidance, such as this breakdown of the best VPN for China, to understand which providers consistently operate under active network controls.
6) Cloud + data access (design for partial failure)
Assume at least one of these will fail: your VPN, a cloud provider, your authenticator, or your ability to receive SMS.
Pause automatic sync for sensitive work folders on untrusted networks.
Separate “travel comms” from “admin access” (e.g., don’t manage production systems from café Wi‑Fi).
7) Legal, compliance, and border realities (don’t ignore this layer)
Security tools live inside law and policy. Some jurisdictions regulate the use of encryption and VPNs, and some border environments involve device searches.
Practical stance
Know what tools are permitted where you’re going (and what your employer allows).
Reduce what you carry: fewer accounts signed in, fewer sensitive files locally, and a clear plan for what happens if a device is confiscated or wiped.
FAQ
Do I really need a VPN when travelling? If you must use public Wi‑Fi, NSA guidance recommends using a personal/corporate-provided VPN to encrypt traffic and avoiding public Wi‑Fi when more secure options are available.
What’s the #1 thing to do before an international trip? Make account recovery work without your phone—Google explicitly recommends creating backup codes for cases where you lose your phone or can’t get verification codes.
How should I store backup codes safely? Google warns not to share backup codes and states that Google never asks for a backup code other than at sign-in, so treat them as highly sensitive secrets.
Why not just rely on SMS MFA abroad? SMS can fail during travel (roaming, number changes, blocked services), so it’s best treated as a fallback rather than a primary factor.
Key takeaways
Design for resilience, not perfection: assume lockouts and partial connectivity failure, and pre-stage recovery.
Prefer hotspots/cellular over public Wi‑Fi when possible, and use a VPN if you must use public Wi‑Fi.
Use layered controls: accounts (MFA + backup codes), devices (hardening), networks (selection discipline), and legal awareness.