Toggle light / dark theme

Elon talks about x-risks and making us a multi-planetary species, amongst other things.


What’s on Elon Musk’s mind? In this exclusive conversation with head of TED Chris Anderson, Musk details how the radical new innovations he’s working on — Tesla’s intelligent humanoid robot Optimus, SpaceX’s otherworldly Starship and Neuralink’s brain-machine interfaces, among others — could help maximize the lifespan of humanity and create a world where goods and services are abundant and accessible for all. It’s a compelling vision of a future worth getting excited about. (Recorded at the Tesla Texas Gigafactory on April 6, 2022)

Just over a week after this interview was filmed, Elon Musk joined TED2022 for another (live) conversation, where he discussed his bid to purchase Twitter, the biggest regret of his career, how his brain works and more. Watch that conversation here: https://youtu.be/cdZZpaB2kDM

The world’s first real-time brain-sensing wearable, allows users to take control of their world with a single thought. Get yours today and join us in building the first generation of mind-enabled experiences.
Available for order at $399.

Follow us:
Twitter: https://twitter.com/nextmind.
Linkedin: https://www.linkedin.com/company/11251811/
Facebook: https://www.facebook.com/nextmindlab/
Instagram: https://www.instagram.com/nextmindlab/

Film director — Nicolas Gazeau.
Music — Jérôme Fagnet.
Production — Content Factory by Prodigious.

Nadella told analysts on an earnings call that the operation had reached $10 billion in annual revenue and was “up more than 40%” year over year. In other words, it was outpacing every other major Microsoft product.

The remarks were revelatory. Nadella was known for reviving Microsoft, overseeing a fivefold expansion in market cap by that point in his seven years at the helm. That growth was largely based on turning Microsoft’s cloud business into a more serious threat to Amazon Web Services in a giant market.

By letting investors in on the enormity of Microsoft’s security business, Nadella was casually uncovering a powerful growth engine. Total revenue across the company was up just 14% from the prior year. And by way of comparison, Palo Alto Networks, one of the largest pure-play security software companies, delivered 21% revenue growth over roughly the same period, on a base smaller than $4 billion.

American firm Olson Kundig has lined the upper floor of this residence next to Sydney’s Bilgola Beach with louvred shutters that fold upwards to expose the living spaces to fresh air and sea views.

The Bilgola Beach House is the first project completed in Australia by Seattle-based Olson Kundig and was designed for a couple who wanted to be able to host large family gatherings.

Situated around 35 kilometres north of Sydney’s central business district, the 873-square-metre house nestles into sand dunes overlooking the beach and the ocean.

The US government has detailed how North Korean state-sponsored attackers have been hacking cryptocurrency firms using phishing, malware and exploits to steal funds and initiate fraudulent blockchain transactions.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) have issued a joint cybersecurity advisory to warn all businesses in cryptocurrency to watch out for attacks from North Korean state-sponsored hackers.

With the constant evolution of data science, you need to be skilled in cutting-edge technologies in the field. In this article, we will look at the top programming languages used in data science.

Data has become enormously valuable in the last decade.

Every big company out there has valuable data that, with the help of a good data scientist, can benefit the way they do their business. In other cases, pinpoint strategies that may not be working that well.

Plastic and molten salt batteries may be the key to grid-scale energy storage.


Electricity is a marvelous thing. It can power every manner of machine and digital device, but it is ephemeral. It has to be used as soon as it is created or it is lost forever. The trick to making it serve the needs of humanity is to store it, and to do that, you need a battery.

There are hundreds of ways to make a battery — the Romans did it with copper and iron in a lemon juice bath. But not all of those storage techniques are practical in the real world. Some are too heavy, others too bulky. Many are too costly or use materials that are too scare. Nickel has long been a major component of today’s lithium-ion batteries, but upheavals in some countries masterminded by criminal leaders have caused it to triple in price recently.

Some batteries are good for powering vehicles. Others are better suited to long term grid-scale storage. This report will focus on two new battery technologies that show promise for storing electricity now so it can be used to power homes and businesses later.

A shadow war is a war that, officially, does not exist. As mercenaries, hackers and drones take over the role armies once played, shadow wars are on the rise.

States are evading their responsibilities and driving the privatization of violence. War in the grey-zone is a booming business: Mercenaries and digital weaponry regularly carry out attacks, while those giving orders remain in the shadows.

Despite its superior army, the U.S. exhausted its military resources in two seemingly endless wars. Now, the superpower is finally bringing its soldiers home. But while the U.S.’s high-tech army may have failed in Afghanistan, it continues to operate outside of official war zones. U.S. Special Forces conduct targeted killings, using drones, hacks and surveillance technologies. All of this is blurring the lines between war and peace.

The documentary also shows viewers how Russian mercenaries and hackers destabilized Ukraine. Indeed, the last decade has seen the rise of cyberspace armament. Hacking, sometimes subsidized by states, has grown into a thriving business. Digital mercenaries sell spy software to authoritarian regimes. Criminal hackers attack any target that can turn a profit for their clients.