Tesla to roll out humanoid robots in factories by next year
Elon Musk's timeline for Optimus includes having the robots operational within Tesla's production lines by the end of 2024.
Google’s latest chrome update will change the way you surf the web
Google is making significant strides to bolster security for Chrome, the world’s most popular browser with 3 billion users.
WhatsApp to introduce comprehensive security checkup feature
Regular prompts within the chat tab will remind users to stay vigilant and consistently update their security measures.
Global IT outage disrupts services worldwide
Microsoft confirmed that the issue had been rectified, but the aftermath left many organizations dealing with backlogs and delayed services.
NASA’s Curiosity rover discovers pure sulfur crystals on Mars
NASA's Curiosity rover, a tireless explorer of the Martian surface, has recently made a groundbreaking discovery.
Big tech’s energy appetite rivals nations
Tech giants Google and Microsoft each consumed 24 terawatt-hours (TWh) of electricity, surpassing the energy usage of over 100 countries.
Cave discovered in the Moon’s hidden depths
The discovery was made using NASA’s Lunar Reconnaissance Orbiter (LRO), which captured radar images of the lunar surface.
Qualcomm sues Transsion Holdings over patent infringement
This legal action is not confined to India alone; Qualcomm has also pursued similar lawsuits in Europe and China.
JWST discovers rotten egg smell on exoplanet
HD 189733 b, discovered in 2005, is located about 64 light years away from Earth in the constellation Vulpecula.
Samsung unveils Galaxy Ring
At the MWC 2024, Samsung introduced the Galaxy Ring, a groundbreaking addition to its lineup of health-focused wearables.
NASA’s Europa Clipper mission faces radiation challenge ahead of launch
The transistors, manufactured by Infineon Technologies, were discovered to fail at lower radiation doses than previously anticipated.
Apple issues new guidance amid surge in iPhone phishing attacks and spyware threats
Phishing attacks have become more prevalent, with hackers employing various techniques to deceive users into revealing sensitive information.