Software
CUDA Proves Nvidia Is a Software Company
There's a deep, forbidding moat that surrounds Nvidia--and it has nothing to do with hardware. Forgive me for starting with a cliché, a piece of finance jargon that has recently slipped into the tech lexicon, but I'm afraid I must talk about "moats." Popularized decades ago by Warren Buffett to refer to a company's competitive advantage, the word found its way into Silicon Valley pitch decks when a memo purportedly leaked from Google, titled "We Have No Moat, and Neither Does OpenAI," fretted that open-source AI would pillage Big Tech's castle. A few years on, the castle walls remain safe. Apart from a brief bout of panic when DeepSeek first appeared, open-source AI models have not vastly outperformed proprietary models.
- Information Technology > Software (0.79)
- Information Technology > Hardware (0.67)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.90)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.71)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.71)
- Information Technology > Software > Programming Languages (0.71)
Windows 11 still runs on code from the 1990s, Microsoft admits
PCWorld reports that Windows 11 still relies on code from the 1990s, particularly the Win32 API from Windows 95, for basic functions like right-clicking. Microsoft CTO Mark Russinovich acknowledges the unexpected longevity of this legacy code, which remains fundamental to many applications and core Windows operations. Previous attempts to modernize the Windows API, including WinRT, failed to fully replace the enduring Win32 system that continues powering today's operating system. Windows 11 is the most modern, secure, and updated Windows ever--at least that's what Microsoft keeps saying. But a senior Microsoft executive recently revealed just how much of the underlying technology in Windows 11 is still legacy, all the way from decades ago. One such relic in Windows 11 comes into play whenever you right-click a file or launch a desktop app. When you perform such tasks, you're executing code that was written in the 1990s. We're talking about the Win32 API, for which Microsoft still maintains a programming reference support document . Although the Win32 API became widespread with Windows 95, it had already been implemented in Windows NT prior to that.
- Leisure & Entertainment > Games > Computer Games (1.00)
- Information Technology > Security & Privacy (0.74)
- Information Technology > Software (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Hardware (0.89)
- Information Technology > Communications (0.73)
Backlash builds over NHS plan to hide source code from AI hacking risk
NHS England is pulling its open-source software from the internet because of fears around computer-hacking AI models like Mythos. A decision by NHS England to withdraw open-source code created with UK taxpayer funds because of the risk posed by computer-hacking AI models is attracting growing backlash. Last month, Mythos, an AI created by technology firm Anthropic, was widely reported to be capable of discovering flaws in virtually any software, potentially allowing hackers to break into systems running it. NHS England has now told staff that existing and future software must be pulled from public view and kept behind closed doors by 11 May because of this risk. The decision goes against the NHS service standard, which requires that staff make any software they produce open-source so that tools can be built upon, improved and used without the need for duplicated effort.
- Information Technology > Software (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence (1.00)
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers. The Linux vulnerabilities have been patched--but many machines remain at risk. Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices. The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators.
- Information Technology > Software > Programming Languages (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Social Media (0.98)
Analytical Extraction of Conditional Sobol' Indices via Basis Decomposition of Polynomial Chaos Expansions
In uncertainty quantification, evaluating sensitivity measures under specific conditions (i.e., conditional Sobol' indices) is essential for systems with parameterized responses, such as spatial fields or varying operating conditions. Traditional approaches often rely on point-wise modeling, which is computationally expensive and may lack consistency across the parameter space. This paper demonstrates that for a pre-trained global Polynomial Chaos Expansion (PCE) model, the analytical conditional Sobol' indices are inherently embedded within its basis functions. By leveraging the tensor-product property of PCE bases, we reformulate the global expansion into a set of analytical coefficient fields that depend on the conditioning variables. Based on the preservation of orthogonality under conditional probability measures, we derive closed-form expressions for conditional variances and Sobol' indices. This framework bypasses the need for repetitive modeling or additional sampling, transforming conditional sensitivity analysis into a purely algebraic post-processing step. Numerical benchmarks indicate that the proposed method ensures physical coherence and offers superior numerical robustness and computational efficiency compared to conventional point-wise approaches.
- Asia > China > Shaanxi Province > Xi'an (0.05)
- Europe > France > Auvergne-Rhône-Alpes > Puy-de-Dôme > Clermont-Ferrand (0.04)
- Information Technology > Software > Programming Languages (0.48)
- Information Technology > Artificial Intelligence > Machine Learning (0.48)
Nonparametric Regression Discontinuity Designs with Survival Outcomes
Schuessler, Maximilian, Sverdrup, Erik, Tibshirani, Robert, Wager, Stefan
Quasi-experimental evaluations are central for generating real-world causal evidence and complementing insights from randomized trials. The regression discontinuity design (RDD) is a quasi-experimental design that can be used to estimate the causal effect of treatments that are assigned based on a running variable crossing a threshold. Such threshold-based rules are ubiquitous in healthcare, where predictive and prognostic biomarkers frequently guide treatment decisions. However, standard RD estimators rely on complete outcome data, an assumption often violated in time-to-event analyses where censoring arises from loss to follow-up. To address this issue, we propose a nonparametric approach that leverages doubly robust censoring corrections and can be paired with existing RD estimators. Our approach can handle multiple survival endpoints, long follow-up times, and covariate-dependent variation in survival and censoring. We discuss the relevance of our approach across multiple areas of applications and demonstrate its usefulness through simulations and the prostate component of the Prostate, Lung, Colorectal and Ovarian (PLCO) Cancer Screening Trial where our new approach offers several advantages, including higher efficiency and robustness to misspecification. We have also developed an open-source software package, $\texttt{rdsurvival}$, for the $\texttt{R}$ language.
- North America > United States > California > Santa Clara County > Palo Alto (0.04)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Asia > Middle East > Syria > Aleppo Governorate > Aleppo (0.04)
- Research Report > Strength High (1.00)
- Research Report > New Finding (1.00)
- Research Report > Experimental Study (1.00)
- Information Technology > Software (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning (0.47)
Sublinear Time Low-Rank Approximation of Distance Matrices
Such distance matrices are commonly computed in software packages and have applications to learning image manifolds, handwriting recognition, and multi-dimensional unfolding, among other things. In an attempt to reduce their description size, we study low rank approximation of such matrices. Our main result is to show that for any underlying distance metric $d$, it is possible to achieve an additive error low rank approximation in sublinear time. We note that it is provably impossible to achieve such a guarantee in sublinear time for arbitrary matrices $\AA$, and our proof exploits special properties of distance matrices. We develop a recursive algorithm based on additive projection-cost preserving sampling.
- Information Technology > Software (0.58)
- Information Technology > Artificial Intelligence > Machine Learning (0.35)
Code Metal Raises 125 Million to Rewrite the Defense Industry's Code With AI
The Boston startup uses AI to translate and verify legacy software for defense contractors, arguing modernization can't come at the cost of new bugs. Code Metal, a Boston-based startup that uses AI to write code and translate it into other programming languages, just closed a $125 million Series B funding round from new and existing investors. The news comes just a few months after the startup raised $36 million in series A financing led by Accel. Code Metal is part of a new wave of startups aiming to modernize the tech industry by using AI to generate code and translate it across programming languages. One of the questions that persists about AI-assisted code, though, is whether the output is any good--and what the consequences might be if it's not.
- North America > United States > California (0.16)
- North America > United States > New York > New York County > New York City (0.05)
- Asia > China (0.05)
- (2 more...)
- Information Technology (1.00)
- Banking & Finance > Capital Markets (1.00)
- Information Technology > Software > Programming Languages (0.57)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.49)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.49)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.30)
- North America > United States > California > San Francisco County > San Francisco (0.14)
- North America > United States > Texas > Travis County > Austin (0.04)
- Europe > Italy > Piedmont > Turin Province > Turin (0.04)
- (11 more...)
- Asia > China > Beijing > Beijing (0.04)
- North America > United States (0.04)
- Asia > China > Shanghai > Shanghai (0.04)
- (3 more...)
- Health & Medicine (0.68)
- Education > Educational Setting (0.46)
- Energy > Renewable (0.45)