Microsoft braids anyons into topological cubits on new Majorana quantum chip

Microsoft braids anyons into topological cubits on new Majorana quantum chip

Traditional qubits are extremely vulnerable to any change in their environment, which makes it difficult to scale up a quantum computer. But the new topological qubits need ten times less error-correction overhead, according to Microsoft. Traditional qubits also require analog controls, like turning a dial. Topological qubits, by comparison, can be controlled digitally. “The results are real,” says Gabriel Aeppli, head of the photon science division of Switzerland’s Paul Scherrer Institute and a professor of…

Read More

Eero's new Wi-Fi 7 routers are here to upgrade your home internet – at a price you'll love

Eero's new Wi-Fi 7 routers are here to upgrade your home internet – at a price you'll love

Eero Eero is celebrating its 10th anniversary this year by launching a new lineup of Wi-Fi 7 routers, including an entry-level option. The Eero 7 and Eero Pro 7 are two new entry- and mid-level routers with Wi-Fi 7 support that will conquer a piece of the market where Eero’s been lacking. The new routers join the Eero Max 7, the company’s flagship mesh router, which is typically priced at $600. The Eero 7, in…

Read More

How we test AI at ZDNET in 2025

How we test AI at ZDNET in 2025

ZDNET The launch of ChatGPT in November 2022 unleashed a new era of AI with the technology soaring in popularity. As a result, many competitors entered the market, developing large language models (LLMs), chatbots, image generators, and more.  Fast forward to 2025 and nearly every major tech company is launching AI products. The technology is also increasingly integrated into hardware, with AI features built into most smartphones, laptops, and tablets.  Also: The best AI for coding…

Read More

Aryaka adds AI-powered observability to SASE platform

Aryaka adds AI-powered observability to SASE platform

Nadkarni explained that Aryaka runs unsupervised machine learning models on the data to identify anomalies and outliers in the data. For example, the models may detect a sudden spike in traffic to a domain that has not been seen before. This unsupervised analysis helps surface potential issues or areas of concern that require further investigation. Once the unsupervised models identify anomalies, Aryaka then applies supervised machine learning techniques. The supervised models benefit from threat intelligence…

Read More

5 reasons your Android Auto keeps disconnecting – and how to fix it today

5 reasons your Android Auto keeps disconnecting – and how to fix it today

ZDNET | Charlie Osborne I recently purchased a vehicle that includes Android Auto, and I was excited to finally be able to use that functionality with my phone. However, one of the first things I noticed was how unreliable the phone/car connection could be. One minute, Android Auto is open, and the next — it’s gone. Also: Finally, I found a wireless Android Auto adapter that’s snappy, functional, and won’t break the bank I did some…

Read More

The tech habits of high-earning professionals might surprise you

The tech habits of high-earning professionals might surprise you

ZDNET Here’s a variation on the chicken-or-egg-style question: does the judicious embrace of technology contribute to greater career success and satisfaction, or are higher achievers more likely to be tech-savvy?  The answer could be both, but evidence suggests higher achievers’ technology habits differ from other users. That’s the prognosis from two recent surveys that attempted to call out the technology habits of higher-achieving or higher-earning professionals.  Also: 5 quick ways Apple’s AI tools can fine-tune…

Read More

What is Perplexity Deep Research, and how do you use it?

What is Perplexity Deep Research, and how do you use it?

Perplexity.ai Besides being better than Google for search, Perplexity, the artificial intelligence (AI) company, wants to be an expert on any subject with its new Deep Research feature.  This cutting-edge tool, launched by Perplexity AI in February 2025, combines autonomous reasoning with rapid processing to deliver exhaustive reports on specialized topics.  Also: Perplexity is the AI tool Gemini wishes it could be According to Perplexity, “When you ask a Deep Research question, Perplexity performs dozens of searches,…

Read More

More used Seagate HDDs disguised as new: Fraudsters make it tough to spot the difference

More used Seagate HDDs disguised as new: Fraudsters make it tough to spot the difference

Physical examination of these units has revealed subtle signs of previous use, including minor dents in the housing, worn SATA connectors, and misaligned stickers — details that might escape casual inspection. Seagate has confirmed at least one instance of fraudulent resale following a customer support inquiry, the report said. In a notable case, the company declined to provide warranty service in Europe for a drive whose serial number was already registered to a US customer,…

Read More

What is sparsity? DeepSeek AI's secret, revealed by Apple researchers

What is sparsity? DeepSeek AI's secret, revealed by Apple researchers

Yuichiro Chino/Getty Images The artificial intelligence (AI) market — and the entire stock market — was rocked last month by the sudden popularity of DeepSeek, the open-source large language model (LLM) developed by a China-based hedge fund that has bested OpenAI’s best on some tasks while costing far less. Also: Cerebras CEO on DeepSeek: Every time computing gets cheaper, the market gets bigger As ZDNET’s Radhika Rajkumar details, R1’s success highlights a sea change in AI that could…

Read More

Hackers gain root access to Palo Alto firewalls through chained bugs

Hackers gain root access to Palo Alto firewalls through chained bugs

Discovery of CVE-2025-0108 came from post-patch analysis of CVE-2024-9474, a medium-severity flaw (CVSS 6.9/10) that was actively exploited in November. At that time, attackers were seen chaining CVE-2024-9474 with another critical authentication bypass vulnerability (CVE-2024-0012) affecting PAN-OS, and together they allowed executing codes remotely on compromised systems. Now threat actors are chaining CVE-2025-0108, and CVE-2024-9474 with a high-severity flaw (CVE-2025-0111) for unauthorized root-level access to vulnerable systems, potentially allowing extraction of sensitive configuration data and…

Read More
1 16 17 18 19 20 1,366