Google I/O 2025: How to watch all the AI and Android reveals Google is gearing up to hold its largest developer conference of the year, Google I/O 2025, on May 20 and May 21. CEO Sundar Pichai, DeepMind CEO and co-founder Demis Hassabis, and executives in charge of Search, Cloud, and Android will announce major updates to Google’s product offerings.
https://youtube.com/clip/UgkxFWqsX_uNTdH9G8kI8yjyzk6wT-lJiHZL?si=aSr3m1hs-WwYGv2B
https://youtube.com/clip/UgkxkJjoJaooxr59bdGG_ozlIpL50iSr59-Q?si=M7GMoKOmQe4tMgdB
Hi guys, To celebrate the #BitcoinPizzaDay I'm selling a full ticket pass for the #Bitcoin2025 conference in Vegas with a good discount. It includes the following perks: 1. Admission to Days 2 and 3 of Bitcoin 2025 2. Access to Main Stage, Open-Source Stages, and more featuring top speakers 3. Entry to the world’s largest Bitcoin Expo Hall 4. Access to the Bitcoin Conference App Does not include access to Code & Country Industry Day If someone is interested - DM me.
Chinese mathematicians solve the 65-year-old Kervaire invariant problem A Chinese team has solved a decades-old mystery that stumped the mathematical world – by resolving the ‘doomsday hypothesis’ originally posted at
Your Brain and Body Literally Sync to Music A new international study supports Neural Resonance Theory (NRT), which suggests that music perception and enjoyment arise from natural brain and body oscillations that sync with rhythm, melody, and harmony. Unlike prediction-based models, NRT proposes that our brains physically resonate with music, shaping timing, pleasure, and the instinct to move. This resonance is thought to occur across various brain and body regions, from auditory pathways to the spinal cord. The findings have broad implications for therapies, education, AI music generation, and understanding how music connects people globally. originally posted at
Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents Security researchers at Fortinet’s FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized Microsoft Word documents to deliver information-stealing malware to unsuspecting Windows users. The attack exploits a well-known vulnerability to deploy FormBook, a dangerous malware variant designed to harvest sensitive user credentials and data. originally posted at