UAW presses automakers to move supply chain out of Xinjiang
A new report on Tuesday suggests that nearly every major automaker has significant exposure to products made with forced labor in China's Xinjiang region......»»
In Beijing, automakers are all-in on EVs
The Beijing show comes as green vehicles reached a milestone in China, accounting for over half of passenger vehicles sold......»»
Apple finally pulls generative AI nude apps from the App Store
Apple has removed apps from the App Store that claimed to make nonconsensual nude imagery, a move that demonstrates Apple is now more willing to tackle the hazardous app category.App Store iconThe capabilities of generative AI to create images based.....»»
Managing meandering waterways in a changing world
Just as water moves through a river, rivers themselves move across the landscape. They carve valleys and canyons, create floodplains and deltas, and transport sediment from the uplands to the ocean......»»
FCC votes to restore net neutrality protections in the United States
In an entirely expected move, the Federal Communications Commission has voted to reinstate net neutrality protections in the United States.FCC sealThe vote on Thursday was on the final form of net neutrality rules, following a previous vote on bringi.....»»
Warming Arctic reduces dust levels in parts of the planet, study finds
Climate change is a global phenomenon, but its impacts are felt at a very local level. Take, for example, dust. Dust can have a huge impact on local air quality, food security, energy supply and public health. Yet, little is known about how global cl.....»»
Continental fined $107M over role in diesel-emissions scam
German prosecutors issued the fine over the company’s participation in the scam via selling more than 12 million engine control units that automakers, including Volkswagen Group, used to manipulate emissions......»»
Congo accuses Apple of using illegal conflict minerals in its supply chain
The Democratic Republic of Congo is accusing Apple of using illegally exploited minerals sourced in the eastern regions, involving violence, child labor and other human rights violations. This allegation disagrees with Apple’s published Conflic.....»»
Congo demands that Apple prove iPhone doesn"t use conflict materials
The Democratic Republic of Congo has told Apple it believes the iPhone maker's supply chain is using materials linked to militia groups.Apple has been asked to verify that it doesn't use "conflict minerals" in the iPhoneApple and at least most Big Te.....»»
Competing rumors cast doubt on mini LED iPad Air debut in May
Supply chain sources apparently vary on when Apple may release a 12.9-inch iPad Air with mini LED, with a new rumor pushing the release much later.Apple's current iPad Air 5Less than two weeks away from Apple's "Let Loose" iPad-centric event in May,.....»»
Apple Watch Series X might get new and thinner motherboard material
A new supply chain rumor claims that Apple will switch to thinner resin-coated copper motherboards for a future Apple Watch, echoing previous reports of the same coming to the iPhone 17.Apple Watch Series 9Resin-coated copper (RCC) is exactly what it.....»»
iPad Air 6: Bad News Just Before Launch
Apple’s upcoming iPad Air 6 reportedly won’t get a display upgrade that had prospective buyers excited. According to Display Supply Chain Consultants CEO and analyst Ross Young, the new 12.9-inch iPad Air won’t have a Mini-LED displ.....»»
Research combines DNA origami and photolithography to move one step closer to molecular computers
Molecular computer components could represent a new IT revolution and help us create cheaper, faster, smaller, and more powerful computers. Yet researchers struggle to find ways to assemble them more reliably and efficiently......»»
Binarly releases Transparency Platform v2.0 to improve software supply chain security
Binarly releases the Binarly Transparency Platform v2.0 with features for continuous post-build compliance, visibility into the security posture of IoT and XIoT devices, and the ability to identify malicious behavior and hidden backdoors within binar.....»»
Fragments of bird flu virus genome found in pasteurized milk, FDA says
The test cannot tell if the virus is live. The FDA still assess milk supply as safe. Enlarge / Cows being milked (credit: Getty | Edwin Remsberg) The Food and Drug Administration on Tuesday announced that genetic fragmen.....»»
New 11-inch iPad Pro could be supply constrained due to OLED display shipments
Apple will announce new iPad models next month, and this includes a new generation iPad Pro powered by the M3 chip and featuring OLED displays for the first time. However, the 11-inch version may face supply problems due to OLED display shipments, wh.....»»
Chery, B-ON form electric van JV for N. America, Europe
The venture will give B-ON access to funding and Chery's supply chain and manufacturing footprint while offering the Chinese state-backed automaker access to European and U.S. markets......»»
New iPad Air & iPad Pro models are coming on May 7
In a surprise move, Apple has announced a new iPad event for May 7, with the iPad Pro and iPad Air expected to debut.The event called "Let Loose" is on May 7. However, it is scheduled a bit earlier in the day than normal, happening at 10AM Eastern ti.....»»
Column: UAW"s victory at VW Chattanooga was historic, but repeating it will be harder
VW workers in Chattanooga voted decisively for the UAW, but repeating at other automakers grows more difficult the longer the campaign goes on......»»
Rumor: iPhone 16 could ditch physical buttons after all
Rumors that Apple is hoping to switch a future iPhone model from physical to capacitive buttons persist. Now, a new supply chain report suggests that Apple has placed a supply chain order for a new capacitive button system that will replace the physi.....»»
MITRE breached by nation-state threat actor via Ivanti zero-days
MITRE has been breached by attackers via two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti’s Connect Secure VPN devices. The attackers have also managed to move laterally and compromise the company network’s VMware i.....»»