Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Take Advantage of APYs up to 4.65% While You Still Can. Today's CD Rates, March 5, 2025

CNET News - Wed, 03/05/2025 - 04:30
Opening one of these high-yielding CDs can help you grow your money faster.
Categories: Technology

Want to Go Car-Free? Test the Waters by Renting a Cargo Bike

WIRED Top Stories - Wed, 03/05/2025 - 04:30
For around $150 per month, you can see how a cargo bike fits into your life. If you find you prefer two wheels to four, you can even buy your rental at a discount.
Categories: Technology

Consumers can buy Zepbound direct from the drugmaker if they'll pay out of pocket

NPR News Headlines - Wed, 03/05/2025 - 04:15

Eli Lilly is offering vials of its obesity drug Zepbound to patients at a discount — but only if they skip their insurance.

(Image credit: Tetra Images/Tetra images RF)

Categories: News

The New Volvo ES90 Is a Stylish Electric Sedan With an SUV's Stance

CNET News - Wed, 03/05/2025 - 04:10
Volvo's stylish new electric car blends sedan proportions with SUV scale, but keeps safety technology as front-and-center as its roof-mounted lidar sensor.
Categories: Technology

Pioneers of Reinforcement Learning Win the Turing Award

WIRED Top Stories - Wed, 03/05/2025 - 04:00
Having machines learn from experience was once considered a dead end. It's now critical to artificial intelligence, and work in the field has won two men the highest honor in computer science.
Categories: Technology

6 takeaways from Trump's pointedly partisan address to Congress

NPR News Headlines - Wed, 03/05/2025 - 04:00

After a firehose of a first six weeks back in the White House, President Trump delivered a boastful and partisan address to a joint session of Congress Tuesday night. Here are six takeaways from the speech.

(Image credit: Allison Robbert)

Categories: News

Dear Life Kit: My friend texts me way too much. How do I get her to stop?

NPR News Headlines - Wed, 03/05/2025 - 04:00

An NPR listener says her friend pings her morning, noon and night, even if she doesn't respond. She'd like to say something, but she's afraid it will hurt her friend's feelings.

(Image credit: Polinmr/Getty Images; NPR)

Categories: News

'God walks with us through the ashes.' A poignant Ash Wednesday after LA wildfires

NPR News Headlines - Wed, 03/05/2025 - 04:00

On Ash Wednesday, Christians hear the words "Remember that you are dust and to dust you shall return." Those words ring differently for many whose churches and homes burned in the Los Angeles fires.

(Image credit: Jason DeRose)

Categories: News

Sony goes full Xbox Insider with new Beta Program at PlayStation initiative, offering the testing of new games and features before release

TechRadar News - Wed, 03/05/2025 - 03:56
  • Sony has announced Beta Program at PlayStation
  • It provides a "centralized place" to keep track of PS5 and PC tests
  • Tests may include PS5 and PC games as well as upcoming console features

Sony has announced a new initiative named Beta Program at PlayStation, which aims to offer a convenient hub to keep track of any and all pre-release tests for upcoming games on PS5 and PC as well as new features.

The accompanying PlayStation Blog post has all the details, with SIE senior director of content communications Sid Shuman describing the initiative as "an easy, centralized place for you to register your interest in a range of future PlayStation betas."

It doesn't sound too dissimilar to the Xbox Insider program for Xbox Series X, Xbox Series S, Xbox One and PC which allows users to register interest in a range of tests for new games and features.

The post continues: "A single registration for Beta Program at PlayStation will allow you to express interest in gaining beta access to test participating games for the PS5 console and PC, new PS5 console features, PlayStation App features, and even user experience features on PlayStation.com.

"You only need to sign up once to express interest in these various betas, and if you receive an invitation to a specific beta, it’s up to you to decide whether you’d like to participate or not."

You can sign up for Beta Program at PlayStation over at its dedicated landing page, the only requirements being that you have a valid PlayStation Network account, live in a supported region and are at or above the legal age requirements for your region.

Additionally, it's worth noting that signing up for Beta Program at PlayStation doesn't necessarily guarantee entries into any and all game and feature tests. This seems to be more of a way to collect those tests in one handy sign-up place instead of having to trawl through separate blog posts or emails.

You might also like...
Categories: Technology

Amazon is apparently going all-in on agentic AI

TechRadar News - Wed, 03/05/2025 - 03:55
  • AWS looks to be gearing up to push forward with agentic AI
  • Agentic AI will be a “multi-billion business”
  • Other organizational restructuring is also happening as new division is formed

Amazon is betting big on the next generation of artificial intelligence – agentic AI – according to internal communications seen by Reuters revealing the company has established a new group focused on task automation.

The initiative is believed to be led by AWS AI and Data VP Swami Sivasubramanian, reporting directly to the cloud computing giant’s CEO, Matt Garman.

Although the company has not confirmed plans to push ahead with AI agents, they’re seen as the next stage in the world of artificial intelligence, and a key focus point for many of Amazon’s rivals.

AWS to invest more in agentic AI

“Agentic AI has the potential to be the next multi-billion business for AWS,” Garman wrote in an email seen by Reuters. “We have the opportunity to help our customers innovate even faster and unlock more possibilities, and I firmly believe that AI agents are core to this next wave of innovation,” he added.

The company isn’t new to agentic AI – the recently previewed Alexa+ voice assistant showcased agentic capabilities destined for consumers, though the time-saving tech is most commonly applied at enterprise levels in its current state – something Amazon might want to capitalize on.

With the example of a broken oven, Devices & Services VP Panos Panay wrote: “Alexa+ will be able to navigate the web, use Thumbtack to discover the relevant service provider, authenticate, arrange the repair, and come back to tell you it’s done—there’s no need to supervise or intervene.”

At the same time, Reuters reports that AWS SVP Peter DeSantis announced that some divisions would shuffle under different headings to “accelerate innovation.”

While Amazon’s key hyperscaler rivals, Microsoft and Google, have also been developing their own agentic AI, Salesforce has arguably led the way with its endless investments and innovations – Salesforce CEO Marc Benioff now envisions the next generation of CEOs having to manage humans an AI agents simultaneously.

You might also like
Categories: Technology

Planning ahead around data migrations

TechRadar News - Wed, 03/05/2025 - 03:41

Whatever applications or services you might use, you will create data. According to Domo’s Data Never Sleeps report for 2024, 251.1 million emails are sent, 18.8 million text messages are received and more than 5.9 million Google searches take place every minute of every day. For businesses, the data they create is essential to their operations, and the volume of that data is going up all the time.

While your applications might not have the same level of traffic as a Google or Netflix, you will have to consider how you manage your data over time. Eventually - whether it is due to needing more space, replatforming your application or just to update your software and avoid end of life problems - you will have to move your data.

Data migration planning for data is a big deal. The potential impact from this kind of project can be massive. So how can you avoid problems and make migrations run as smoothly as possible?

Planning Ahead

To make your migration process a success, the first step is to understand what you intend to move. By taking an inventory of what your system is built on, and what it is connected to, you can create a list of dependencies that have to be supported as part of the migration. This can show up some items that you had either overlooked, or other updates that might be needed to complete your migration successfully.

For example, you may find that you have more instances of the system you want to migrate than you thought. This can include test and development environments for your apps, or other systems that were initially considered out of scope. Finding these before you carry out any move is essential, as you don’t want to deal with these issues when you are mid-way through a migration.

Similarly, review your implementations for any specific deployment patterns and the target state requirements that you should be aware of. Databases all scale differently - for instance, most relational databases are built around using a single primary server instance. If they have to scale, then either a bigger machine is needed or additional replicated databases can be used to allow for more read requests. For others, they run as sharded environments where many different nodes work in concert with each other to serve a large dataset.

Databases may also have specific capabilities to consider - for instance, Redis uses modules to supply additional functionality alongside its core in-memory database design. PostgreSQL also relies on extensions to the core database for further functionality, so any of these that are in place would also have to be updated during a migration.

Alongside the IT infrastructure components that you have in place, you should carry out a performance evaluation to see how your system currently processes data. This could include tracking metrics like application throughput, latency and patterns in transaction volume over time. Getting these figures in advance of any move provides you with a baseline to compare against once you have completed that move. You can then use this data to plan ahead on any expected growth in traffic levels, or whether you might need to add more capacity as part of any migration.

Understanding the full inventory

Understanding the full inventory of components involved in the data migration is crucial. However, it is equally essential to have a clearly defined target and to communicate this target to all stakeholders. This includes outlining the potential implications of the migration for each stakeholder. The impact of the migration will vary significantly depending on the nature of the project. For example, a simple infrastructure refresh will have a much smaller impact than a complete overhaul of the database technology.

In the case of an infrastructure refresh, the primary impact might be a brief period of downtime while the new hardware is installed and the data is transferred. Stakeholders may need to adjust their workflows to accommodate this downtime, but the overall impact on their day-to-day operations should be minimal.

On the other hand, a complete change of database technology could have far-reaching implications. Stakeholders may need to learn new skills to interact with the new database, and existing applications may need to be modified or even completely rewritten to be compatible with the new technology. This could result in a significant investment of time and resources, and there may be a period of adjustment while everyone gets used to the new system.

Therefore, it is essential to have a clear understanding of the target environment and to communicate the potential implications of the migration to all stakeholders well in advance. This will help to ensure that everyone is prepared for the change and that the migration goes as smoothly as possible.

Making The Move

The golden rule for any big data migration project is to work step by step. Rather than a ‘big bang’ cut-over, isolate any change so that you can track your progress and easily roll back if you need to. Alongside this you should carry out a full backup for your data so you have a version to migrate back to, or implement separately if something goes wrong. With some migrations, the process to move back is difficult, so this back-up is a necessary backstop in case of a failure.

In the ideal scenario, you will have a complete mirror of your production environment and associated load generators and tests that cover all usage scenarios. This is notoriously difficult and expensive to achieve and having that 100% confidence requires a lot of effort. Even if you do have that confidence, there is a law that things will probably go wrong at some point. There are several techniques that you can employ to improve your chances of success.

The first of these is a canary deployment. This involves looking at your systems and selecting one that you will migrate over first. This deployment can be used to see how successful the move is over time, and to help you find any potential problems before you move all your systems over to the new database. Like a canary in a coalmine saves the majority, this initial migration shows you where any problems exist and how to fix them before the complete change-over leads to more rework.

This approach relies on your before-and-after metrics so you can spot any discrepancies in performance, as well as any failures or integration problems. This can show potential issues when you move - for example, many of those migrating away from MySQL 5.7 found that the supported version (MySQL 8.0) had worse performance than their previous deployment. This dip in performance might be a problem for your specific application, but in this case, 5.7 has reached its End of Life (EOL).

Although EOL support is available from specialist vendors to keep your systems going, relying on this is merely postponing the inevitable. So, looking at why that performance is lower and where this can be fixed is in order. Once you have checked your metrics and you are in a position you are comfortable with, you can then move other instances into production.

One additional consideration once you are in the middle of your migration is tracking that performance side. Comparing reports or dashboards manually is time-consuming and hard work. To get around this, you can set automated alerts or rules for potential rollbacks. This approach involves creating specific triggers where your deployment would lead to an automatic rollback to the previous deployment. This can help you take your time when you run into a situation that you did not expect, and then take the time to understand the problem.

Know Your Status

Alongside the technical aspects of a migration, there is another area that should be planned in advance. When you make a major change like a data migration, a communications plan that brings together everyone involved is essential. For data, this can include multiple departments across IT including any application developers responsible for the system through to database and IT operations professionals that manage the deployment. However, this plan should also include business teams that rely on that application, as they would be affected by the change too.

This plan provides a framework for talking through developments as they come up, and ensuring that everyone is aware of any incidents. As any unforeseen problems arise, the whole organization can be aware of the impact and how this might affect the migration plan. This can then keep migration plans on track, or get support for any amendments to that plan as needed.

Forrester points to how companies are expanding their operations based on data, and this relies on applications, infrastructure, people and processes as well as the physical data itself. As you plan any migration, you will have to take that mix of dependencies into consideration. By looking at data as part of that wider framework, you can plan ahead and ensure your migration is successful.

We've compiled a list of the best data recovery software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

In Key West, testing shows cruise ships stir up as much sediment as a hurricane

NPR News Headlines - Wed, 03/05/2025 - 03:22

Tests in Key West show sediment stirred up by cruise ships, which can harm marine life, routinely exceed federal standards. Key West has responded by suspending the tests.

(Image credit: Handan Khanna)

Categories: News

Why a small Colorado town wants to buy its neighboring ski resort

NPR News Headlines - Wed, 03/05/2025 - 03:14

Big conglomerates dominate ownership of America's ski resorts. When a Colorado ski hill went up for sale, a neighboring town launched a bid to buy it to preserve its relaxed culture and affordability.

Categories: News

Daredevil: Born Again episode 2 just gave me hope that the titular hero will join forces with Spider-Man in the MCU, but it won't happen on Disney+

TechRadar News - Wed, 03/05/2025 - 03:00
  • Daredevil: Born Again episode 2 contains an unexpected Spider-Man Easter egg
  • The webslinger is referenced by Wilson Fisk early in the series' second chapter
  • It's highly unlikely that Spider-Man will appear in the show

Daredevil: Born Again's first two episodes are out now on Disney+ – read my Daredevil: Born Again review to see what I thought of it – and the eagerly awaited Marvel TV show is already generating plenty of discussions online.

Chief among those fan conversations is that emotionally devastating moment in its first episode (no spoilers for anyone who ended up here but hasn't watched it yet). Discussion-worthy as that incident is, though, I was far more surprised by an obvious reference to Spider-Man in the show's second episode, and it's one that's made me even more desperate for a big-screen team-up between Peter Parker and Matt Murdock.

Spoilers follow for Born Again episode 2, titled 'With Interest.' Turn back now if you haven't streamed it yet on Disney+.

The devil's in the details in Born Again's second episode (Image credit: Marvel Studios/Disney Plus)

The reference is made by Wilson Fisk as he addresses New York following his mayoral election victory. Speaking via a live stream that's shown on Times Square's giant screens and beamed into homes across the city, Fisk calls his triumph "a new era for the greatest city in the world," but it's the next part of his speech that contains the Easter egg-style remark concerning the web-slinger. "We don’t need a gun-toting vigilante who wears a skull mask on his chest," Fisk says before adding: "Or a man who dresses in a spider outfit, or a guy who wears devil horns to save us."

The "skull mask" and "devil horns" remarks, which refer to Frank Castle/The Punisher and Murdock's vigilante alias, respectively, are to be expected. After all, Fisk battled both crimefighters during his time as Kingpin, aka one of New York's most fearsome crime lords, during Daredevil's three-season run on Netflix.

His quotes about "a man who dresses in a spider outfit," though, is the first time that Fisk has acknowledged Spider-Man in the Marvel Cinematic Universe (MCU). Okay, until Born Again's release, Fisk had only appeared in two MCU projects – Hawkeye and Echo – so he'd not had the chance to mention the wallcrawler. Now that he has, though, Marvel has a golden opportunity to bring Spidey and Daredevil together to potentially fight Fisk.

Will Spider-Man appear in Daredevil: Born Again?

You shouldn't expect Tom Holland's webslinger to appear in Daredevil: Born Again (Image credit: Sony Pictures/Marvel Entertainment)

Unfortunately, the chances of Peter Parker and Matt Murdock joining forces in Born Again are slim to none. That's in spite of Marvel fans thinking that they would, too, with some suggesting that Born Again's official trailer contained its own Spider-Man Easter egg.

Why won't Spider-Man appear in this Marvel Phase 5 project, then? In short, he's not allowed to show up in live-action productions on Disney+, aka one of the world's best streaming services.

Speaking on a February 2025 edition of the Phase Zero podcast, Marvel's Head of TV, Streaming, and Animation Brad Winderbaum explained why Spidey isn't allowed to appear in the studio's small-screen projects. Essentially, because Sony owns the long-form, live-action rights to the Spider-Man IP, the webslinger is forbidden from popping up in MCU TV shows.

However, he's allowed to feature in animated projects, which is why he made a brief cameo in X-Men 97 season 1 and starred in a completely separate animated series – Your Friendly Neighborhood Spider-Man – earlier this year. Interestingly enough, Daredevil appeared in the latter and was voiced by Charlie Cox, who's played the character in a live-action capacity since 2015.

So, what are the chances of The Man Without Fear appearing in Spider-Man 4 instead? Vincent D'Onofrio, who plays Fisk, recently denied (via The Meltdown Press) that he and Cox aren't part of that Marvel Phase 6 movie's cast. That may be the case, but let's not forget that Andrew Garfield consistently denied he'd appear in Spider-Man: No Way Home, and look what happened there.

In short, don't expect Spidey to appear in Daredevil's first standalone MCU adventure. If he does, you can be darn sure that I'll be updating my Daredevil: Born Again season 1 hub, plus my Born Again cast and character guide, to reflect that crowd-pleasing moment.

You might also like
Categories: Technology

The Circular Ring 2 solves a crucial smart ring problem, and it's available to pre-order now

TechRadar News - Wed, 03/05/2025 - 02:00
  • The Circular Ring 2 was unveiled early in 2025
  • It features digital ring sizing, ECG, and more
  • It's now available to pre-order on Kickstarter

Following its reveal at CES 2025, the new Circular Ring 2 is now available to pre-order via Kickstarter.

The Circular Ring 2 will have its work cut out if it wants to challenge the Oura Ring 4 and Samsung Galaxy Ring for the title of best smart ring on the market, but it comes with some nifty and unique features that make it stand out. The Circular Ring Slim was a pretty disappointing offering, so can the Ring 2 do any better?

The Circular Ring 2 is priced at $549 (AUS and UK tbc), but you can save up to $310 as a Kickstarter backer. Headline new features include a new digital ring sizing system that lets you use a smartphone to measure your ring size before ordering. It's a far cry from the plastic sizing kits of other vendors and a much-needed upgrade in this sector.

Circular has added a wireless charging case to the Ring 2, which lets you store and charge your ring on the go so you're never caught short on battery life.

Another significant upgrade is women's health tracking, with personalized insight into cycle tracking, temperature monitoring, and insights into fertility, menopause, and overall well-being.

There are also more general health tracking advancements, notably a US Food and Drug Administration (FDA)-approved Afib detection and ECG capabilities.

Does Circular finally have a winning smart ring?

(Image credit: Circular)

With sleep-stage tracking, AI-powered insights, and all of the aforementioned upgrades, it sounds like the Circular Ring 2 might be a real contender in the smart ring space for 2025. Naturally, all of the features from the Ring Slim including activity tracking, blood oxygen, heart rate, and more are also included.

In our Ring Slim review, we noted the disappointing battery life, frustrating app, and the exterior, which is vulnerable to scratches. The Ring 2 promises up to seven days of battery life over the two on full features or five on limited features of the previous model, a promising sign.

As noted, you can pre-order now via Kickstarter for $549, and score yourself a discount of up to $310. Circular says the Ring 2 is expected to ship in June, 2025.

You may also like
Categories: Technology

Under the hood of data sovereignty

TechRadar News - Wed, 03/05/2025 - 01:48

The huge growth of public cloud computing providers in recent years has given rise to all kinds of digital-first businesses, and taken much of the hassle of establishing on-premise storage and computing power for others. But in moving to the cloud, organizations accept additional complexities around where and how their data is stored, encrypted and accessed in exchange for the flexibility and scalability that the cloud can offer them.

Data sovereignty is centered around these kinds of considerations, and represents a given country or territory’s ability to control the data within its borders. Whether it’s regulatory compliance, seeking a competitive advantage, or simply addressing the basics of building trust with customers and partners and ensuring data security, more and more businesses are turning to data sovereignty as a discipline to help give some of this control back.

What are some of the common business challenges when it comes to data sovereignty?

One significant influence is the fact that many laws around data, such as the US CLOUD Act or the European Union’s GDPR, extend beyond the borders of their originating countries. These impact how companies store and process data globally, and can often create conflicting legal obligations and complexities. At the same time, the increased focus on compliance needs can’t come at the cost of cybersecurity in the cloud, which still needs to be maintained. Security needs to be tight, but the data still needs to be accessible for business operations to stay agile enough.

Challenges also arise around data sovereignty efforts due to the need to classify data by sensitivity. Doing this can be nuanced and challenging – not to mention the fact that sensitivity of data can change over time. Working with such a constantly moving target, it’s therefore no surprise that data sovereignty was ranked amongst the top three emerging security concerns amongst enterprises in the annual Thales Data Threat Report. Businesses need tools that can help them continuously monitor, protect and classify data by risk as contexts change.

How do organizations operationalize data sovereignty?

Typically organizations start by classifying their data. This can become extremely complex when you consider the different business functions, deliverables and divergent needs – but generally organizations use a three- or four-level system.

Next can come an analysis of applicable regulations to the business, such as the GDPR, CCPA or other national laws, to understand what data protection requirements are in play. From there, IT teams need to assess where data is geographically located, as in some jurisdictions, regulations require residents’ data to be stored and processed in the country where the legislation applies. As a result, this may impact the choice of cloud storage, or mandate additional measures around protection to ensure compliance is achieved.

Taking the time to do this allows organizations to determine the extent of their needs, and the resulting encryption key management strategy that’s right for them. There are broadly three types of key management strategies. Bring Your Own Keys (BYOK), where an organization generates keys in their own environment, and imports them into the cloud to then use; Hold Your Own Key (HYOK), where keys remain stored in the organization's domain; and finally Bring Your Own Encryption (BYOE), which offers the highest level of security with organizations using their own cryptography as well as the keys themselves.

These all offer varying levels of control and security depending on the level of assurance required for a given dataset. Often organizations might find it easiest to take a high-watermark approach, secure everything at the level required for the most sensitive, and avoid the complexity of managing different standards.

How does encryption tie into data sovereignty needs?

Fundamentally, encryption asserts control over who can access data – meaning data sovereignty can’t exist without it. In many legal jurisdictions, it’s also a compliance requirement to be actively using it. But encryption is only as good as the key management in place allows it to be. The key management infrastructure is essential in ensuring proper control over the encryption mechanism. The value of any sovereignty program comes from the control in place of users, entities and applications that can access and use encrypted data.

A good encryption strategy should cover the whole process, from key generation to their correct distribution, usage, and disposal at end-of-life. In turn, that encryption should be also flexible enough to cover data in transit across networks as well as at rest in storage.

What other measures should businesses be considering to protect their data?

Alongside encryption, strict access control and security policies are essential to limit the risk and impact of data breaches. Regularly reviewing who has access to what data, and revoking permissions if they’re no longer needed, can reduce the risk of some of the most common source of breaches.

Upgrading the authentication technologies used beyond passwords alone also makes it harder for account takeover attacks or credential theft to impact the business. Two-factor authentication, passkeys or biometrics can help overcome some of the common security risks that come with using solely passwords, and relying on users to remember and regularly change them.

Cloud backups and snapshots are the final piece of an effective data protection strategy, with rapid restoration and resumption capability in the event of an emergency. Businesses must also take care to regularly test this data to ensure it is immediately operable in such a high-pressure situation.

What role might quantum computing have on the future of data sovereignty?

Quantum computing is not yet a mainstream prospect, but in the wrong hands, it has the power to crack the underpinning cryptography that powers the encryption that we all rely on today. This has led to research into the development of post-quantum cryptography (PQC), that are intended to be resistant to this threat.

The other notable risk around quantum computing is around ‘harvest now, decrypt later’ activity by cybercriminals, which takes advantage of flaws in how encrypted data might be stored now to steal it. The eventual goal would be to leverage the power of quantum at some point in the future in order to later decrypt that stolen data.

The risk from quantum, though seemingly far off, represents a huge change in how organizations approach encryption, and it will take some time to switch. It emphasizes the importance for businesses to begin planning for this transition as soon as possible, staying informed about advancements in quantum computing, and exploring PQC solutions to minimize the chances of any operational disruptions or compliance failures.

How could next-generation mobile connectivity like 5G and 6G impact data sovereignty measures?

With enhanced bandwidth and spectrum efficiency, the evolution from 5G to 6G standards and beyond address the ever-growing demand for improved bandwidth and reduced latency for both consumer and enterprise applications. But as these network capabilities expand, so do the complexities of managing privacy and data sovereignty.

To make the best use of the available bandwidth, network operators will likely have to be more intrusive about the data they’re collecting on usage as well as the devices used. 5G’s very architecture also makes edge computing – the practice of decentralizing data processing and moving it closer to the data source – a reality. For enterprises, this means greater flexibility about how and where they decide to base their operations, and for the countries and territories they’re operating in, greater control around how this data is being generated and processed.

At the same time, 5G’s high-speed connectivity also means significantly more data generated, transmitted and processed, making the control and enforcement of data residency laws and associated regulation more complex. The overall decentralization of data processing that 5G makes possible can make it harder for CSOs to enforce consistent security protocols.

What is AI’s possible impact on data sovereignty?

What and where the underlying data that AI is drawing on comes from is the main concern here. Emphasis should be placed on the importance of protecting the personal data that is used to train AI. As the rollout of this technology continues, robust frameworks around data governance must be established so that data privacy and integrity become foundational aspects in how AI model are developed.

Such is the speed of technological development in this area that it will take some time for legal frameworks to catch up, and this lag creates a vacuum where data can be misused or mishandled. In the meantime, enterprises must establish guardrails of their own in their investigations and research with AI, as they would with any other technology that collects and analyses data to power decision-making.

We've listed the best data migration tool.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

China's parliament opens with confidence about the economy despite tariffs, headwinds

NPR News Headlines - Wed, 03/05/2025 - 01:42

China will aim for economic growth of around 5% this year, the same as last year. This comes despite deep domestic challenges and fresh tariffs on Chinese imports to the U.S.

(Image credit: Andy Wong)

Categories: News

Read President Trump's 2025 address to a joint session of Congress

NPR News Headlines - Wed, 03/05/2025 - 00:53

Read President Trump's address to a joint session of Congress delivered on March 4.

(Image credit: Andrew Harnik)

Categories: News

Spanish-language rebuttal to Trump's joint address focuses on immigration

NPR News Headlines - Wed, 03/05/2025 - 00:38

New York Rep. Adriano Espaillat delivered the Democrats' Spanish-language rebuttal to President Trump's joint address, focusing on the president's immigration policy.

(Image credit: Rod Lamkey)

Categories: News

Factor Promo Code: Up to $130 Off Meal Prep

WIRED Top Stories - Wed, 03/05/2025 - 00:30
Make meal prep easier for any dietary need while enjoying great savings with our hand-picked Factor discount codes.
Categories: Technology

Pages

Subscribe to The Vortex aggregator