Heading: Blog

Amazon will spend nearly $150 billion on data center expansion to become a leader in AI

Over the next 15 years, Amazon plans to spend $148 billion on data centers, which will allow it to cope with the expected explosive growth in demand for AI applications and other digital services, Bloomberg writes. AWS revenue growth fell to a record low last year as customers sought to cut costs and delayed modernization projects. Now their expenses are again […]

New article: Review of the Hisense Laser Mini Projector C4 1K laser projector: advanced technologies in action

In 2024, the products of the Chinese company Hisense no longer seem unusual. Over the past two years, the brand has significantly accelerated its pace of conquering the Russian market, has become well recognized and occupies a leading position, for example, in the TV market. But Hisense also has interesting offers in other areas, including a mini-projector with an impressive range of advanced technologies. Source: 3dnews.ru

Release of GNU Coreutils 9.5 and its Rust version

A stable version of the GNU Coreutils 9.5 set of basic system utilities has been published, which includes programs such as sort, cat, chmod, chown, chroot, cp, date, dd, echo, hostname, id, ln, ls, etc. Key innovations: The cp, mv, install, cat and split utilities have optimized write and read operations. The minimum readable or writable block size has been increased […]

Amazon, Google, Oracle, Ericsson and Snap founded Valkey, a fork of the Redis database management system

ΠžΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΡ Linux Foundation объявила ΠΎ создании ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π° Valkey, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠΈΡ‚ Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΠ΅ ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚ΠΎΠΉ ΠΊΠΎΠ΄ΠΎΠ²ΠΎΠΉ Π±Π°Π·Ρ‹ Π‘Π£Π‘Π” Redis, распространяСмой ΠΏΠΎΠ΄ Π»ΠΈΡ†Π΅Π½Π·ΠΈΠ΅ΠΉ BSD. ΠŸΡ€ΠΎΠ΅ΠΊΡ‚ Π±ΡƒΠ΄Π΅Ρ‚ Ρ€Π°Π·Π²ΠΈΠ²Π°Ρ‚ΡŒΡΡ ΠΏΠΎΠ΄ эгидой ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Linux Foundation Π½Π° нСзависимой ΠΏΠ»ΠΎΡ‰Π°Π΄ΠΊΠ΅ с ΠΏΡ€ΠΈΠ²Π»Π΅Ρ‡Π΅Π½ΠΈΠ΅ΠΌ сообщСства Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Ρ‡ΠΈΠΊΠΎΠ² ΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ, заинтСрСсованных Π² ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ΅Π½ΠΈΠΈ сохранСния ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚ΠΎΠΉ ΠΊΠΎΠ΄ΠΎΠ²ΠΎΠΉ Π±Π°Π·Ρ‹ Redis. К Ρ€Π°Π±ΠΎΡ‚Π΅ Π½Π°Π΄ ΠΏΡ€ΠΎΠ΅ΠΊΡ‚ΠΎΠΌ ΠΏΡ€ΠΈΡΠΎΠ΅Π΄ΠΈΠ½ΠΈΠ»ΠΈΡΡŒ Ρ‚Π°ΠΊΠΈΠ΅ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ, ΠΊΠ°ΠΊ Amazon Web […]

Under pressure from users, Google overcomes hardware limitations to implement AI in Pixel 8

In December, Google introduced Gemini Nano, a large language model optimized for mobile devices. According to the company, AI will become an integral part of the Android OS, but in the current line of devices only the Pixel 8 Pro received AI functions. The younger Pixel 8, based on the same Tensor G3 chipset, was left without built-in AI due to β€œhardware limitations.” After a wave of dissatisfaction among Google users […]

In April, M**a will add artificial intelligence to Ray-Ban M**a smart glasses

M**a will officially incorporate artificial intelligence into its Ray-Ban M**a smart glasses as early as next month, according to a report from The New York Times. Multimodal artificial intelligence functions such as simultaneous translation, object, animal and monument identification have been in early access since December last year. Image source: M**aSource: 3dnews.ru

VPN Lanemu 0.11.6 Released

Lanemu P2P VPN 0.11.6 has been released, an implementation of a decentralized virtual private network that works on the Peer-To-Peer principle, in which participants are connected to each other, and not through a central server. Network participants can find each other through a BitTorrent tracker or BitTorrent DHT, or through other network participants (peer exchange). The application is a free and open analogue of VPN Hamachi, written […]

Vulnerability that allows you to substitute escape sequences in other people's terminals

A vulnerability (CVE-2024-28085) has been identified in the wall utility, supplied in the util-linux package and intended for sending messages to terminals, which allows an attack on the terminals of other users through manipulation of escape sequences. The problem is caused by the wall utility blocking the use of escape sequences on the input stream, but not doing so on command line arguments, allowing an attacker to escape escape sequences […]