Recent Posts

Pages: 1 ... 5 6 [7] 8 9 10
61


Even though I’ve already built a pretty solid open-source graphics stack at this point, I’m always on the lookout for new tools or hidden gems. That’s exactly how I discovered some of my favorites, like Photopea and PhotoDemon. Recently, I came across a tool called miniPaint. It’s a free, open-source, lightweight image and graphics editor that runs in your browser, and it’s self-hostable too.

Although it’s not a match for Photoshop's capabilities, it’s a great option for anyone who needs a lightweight option with a bit more data control. And it covers most of the use cases I used to rely on Photoshop for, anyway, so it can almost be a full replacement.

What exactly is miniPaint?
It’s not just a painting tool, but an image editor too



Despite having the word “paint” in its name, miniPaint by Viliusle is both a painting and image editing tool. It’s a free, open-source editor that runs entirely in your browser, and unlike many online editors that require accounts or cloud storage, miniPaint doesn’t send your data out - everything is processed directly in the browser. While you need a connection to load the app initially, you can actually use it offline because it uses service workers to cache data and assets in your browser, allowing you to keep working. This is already a major win in my books because both web access and offline functionality makes a tool more accessible.

miniPaint was created as a lightweight alternative to heavier desktop editors like Photoshop, using layers, brushes, filters, and typical image manipulation tools that most graphics workflows require. It supports a broad range of popular raster formats, including PNG, JPG, BMP, WebP, and TIFF, letting you save and export in multiple formats. It even lets you export layer data in JSON for future edits.

Overall, miniPaint strikes a good balance between simplicity and depth. It has essential features like layer-based non-destructive editing, color adjustments, brushes, text, effects, and more, but without overwhelming giant toolsets you rarely use. It’s ideal for creators who need a capable image editor that’s accessible from anywhere, works offline, and doesn’t require your information for an account or subscription. The app gives you everything you need for quick edits, mockups, social media graphics, banners, and everyday graphics work. Plus, you can self-host it.

How it can replace Photoshop
It’s more capable than it looks on the surface



The first tools I wanted to play around with were the Brush and Pencil. They’re pretty stripped-down compared to Photoshop in terms of the adjustable properties. You can select the color, size, opacity, and pressure, but that’s it. This is still decent given many free editors don’t even have a brush tool - you’d be able to paint some masks onto your images or do creative drawings in miniPaint.

The Fill and Gradient tools also caught my eye because I generally like using them for creating overlays on my images. You can get very precise with the color values and gradient placement. Both of them also have adjustable properties like radial strength and opacity. I also quite like the Blur tool - since the wall behind my PC is textured, I like softening it with some type of blur tool or mask if the lighting exaggerates the texture too much, and miniPaint does a good job.

It also comes with a Color Correction tool which I really like - it’s a simple kit but effective, letting me adjust the hues and tones with a preview. The filter selection is more plentiful than I expected. You will find things like box blur, denoise, oil painting, solarize, and there are also Instagram-specific filters. Lastly, there’s a very capable text tool with options for fonts, size, color, stroke, format, kerning, and leading.

miniPaint can’t do everything Photoshop does
It’s a “mini” tool, after all



The biggest Photoshop-like feature I’m missing in miniPaint is proper selection tools. You only get a Rectangle selection tool that you have to manually adjust. And the masking system isn’t very smooth either - you can’t right-click to add a mask from selection and have to navigate to the menu bar instead. There’s also no Lasso selection tool for finer selections, which is a major component of creating things like composites.

Being a lighter-weight tool, I didn’t expect it to have smart objects, but it is a nice-to-have for more complex edits, so I’m missing it a bit. It also lacks more advanced typography and is more on par with tools like Canva in terms of the text offerings. Plus, there’s no perspective editing.

Less software, similar results

miniPaint isn’t a complete replacement for Photoshop, especially considering its lack of proper selection tools. However, it steps up in most other areas. I can create stylish overlays, draw sketches, add unique effects, color correct and color grade, do some basic graphics work with shapes and text, and create design assets. Plus, it’s accessible from any operating system or device with a browser.



source
62


Operating systems are fairly complex pieces of software, and typically, they're the foundation of your computer experience. You don't usually expect to be able to run one operating system like Windows 11 inside another unless you get into virtual machines. But the idea of running an OS inside your browser still sounds like something of a dream.

Over the years, though, as technology has evolved, this has definitely become possible, and not only can you run classic operating systems in a web browser, but some newfangled solutions have popped up that could be considered their own operating system. So, if you feel like experimenting, here are a few options you can try out.

Windows 95 (and older)
A trip back in time

If you're around my age or older, you've most likely used Windows 95 at some point, and we all yearn for the "good" old days sometimes. It's not that I really miss Windows 95, but it's always nice to take a trip back and be reminded of what things were like in the mid-90s and how far we've come, for better or for worse.

Thanks to the PCjs website, run by Jeff Parsons, you can run Windows 95 right in your browser through a virtualized environment, offering a fully functional experience without any complicated setup. It's actually a bigger deal than you might think considering it can be pretty hard to set up properly working VMs for these old operating systems on modern PCs.

In fact, PCjs has even older versions of Windows if you feel like taking a trip to the past. Even Windows 1.0 is available to test, so you can see the humble beginnings of the world's most popular desktop operating system.



ProzillaOS
It's... almost functional

Jumping back ahead to the modern day, ProzillaOS is more of a pseudo-operating system that can also run in your web browser. Realistically, you can't use this to do a whole lot, but it does give you a desktop environment and a handful of the apps you'd expect from an OS, including a file manager (where you can upload files from your own computer), a terminal, and some games. The terminal even supports some typical UNIX/Linux commands like neofetch for displaying system information.

Unfortunately, this isn't really a great experience. While you can upload some images to it, it doesn't seem to do so very reliably (especially for larger files), and the built-in web browser doesn't seem to load anything aside from a couple of default pages. Of course, it's not like you need a browser in the OS when you're already using the OS in a browser, but still. At least you do have a handful of games to play around with, and the whole thing looks and feels fairly modern.



IBM OS/2
Before Windows took over

Before Windows took over the computing world in the mid-to-late 90s, IBM was still one ofthe leading figures in the computing space, and in addition to making computers, it made the operating system for them. OS/2 was released in 1987 as an intended successor to PC DOS, and it was developed jointly by IBM and Microsoft, though Microsoft also released Windows 2.0 the same year.

Thankfully, the PCjs website has also preserved usable versions of OS/2 from 1.0 to 1.3. At least, I assume so — I actually can't get much done with OS/2, I must admit. You can launch the OS/2 or DOS terminal relatively easily, and the website UI lets you load different drives into the computer, which should let you run certain programs, and you can also load up your own files if you want. However, I'm not sure how to actually run them. If you're more familiar with the operating system, you may be able to get something done with it, but there isn't much of a GUI here to help you out.



exaequOS
Practice development

There are certainly more web-based operating systems out there than I expected, and exaequOS is yet another one that's fairly interesting. It's based on UNIX and according to the develop, it can even run Wayland apps. A few apps are available out of the box, including the Nano text editor, a terminal-based version of the game 2048 (along with a few others), and more.

The goal of exaequOS is to help users understand the basics of development in UNIX systems, with support for languages such as C, C++, Lua, and more, with apps available to help you code in all these languages. You can even make WebAssembly apps. It's a fairly basic setup, but a very interesting one all the same, especially if you truly want to learn some basic principles of development.



Mac OS (and OS X)
Oh yes, it's possible

Rounding up the retro side of things, we have Mac OS X, which is available online thanks to the folks over at Infintite Mac. The website offers versions of Mac OS X all the way up to 10.4, though this one is labeled as unstable. Unfortunately, even version 10.3 seems kind of unusable with the provided virtual hardware. Mac OS X 10.1 is also available and fares a bit better, though I still wasn't able to connect to the internet and it slowed down quite a bit when doing anything.

It's frankly a better experience just using an older version, such as Mac OS 9.0. It looks a little older, but it runs more smoothly, and it even comes with some games and programs included out of the box. I was even to play the original DOOM on it, and running Doom on a virtual Mac inside a web browser is still kind of cool. There are a ton of Mac OS versions here, all the way back to the Apple System 1. It's a cool piece of history for those of us who have only ever known Windows as the big desktop platform.



Puter
A proper operating system in a browser

We've covered a few operating systems designed for the web so far, but Puter is really in a league of its own. This operating system is one of the most complete solutions you can find, and it truly offers a robust experience that works surprisingly well. The file manager feels very well design, and right-clicking it actually shows options as if it was a proper operating system, rather than just bring up your browser's context menu or something.

Puter has no reason to work as well as it does, yet it offers a very smooth experience with a ton of apps to play around with, and even an app store of sorts where you can find games and other tools. There's a full-blown word processor in the form of OnlyOffice, and on that note, you can also use its spreadsheet software or presentation maker. Puter also lets you sign in with an email address to save your work across sessions. And for games, there's a Fruit Ninja clone here that runs super smoothly, too.

My colleague Tanveer Singh has covered Puter before, and it's no wonder it was the focus of a sole article. This is a legitimately cool experience that serves as a great time-waster and a learning project alike. I highly recommend checking this out; I guarantee you'll spend more than a few minutes trying to see what it has to offer.



It's amazing what's possible

Regardless of how you feel about a particular operating system on this list, it's just cool to see how much can be done directly within a web browser these days. Whether it's running a classic operating system to relive your childhood or creating a whole new web-based experience, people have put a lot of effort into creating full-fledged experiences that don't require a complicated setup. These aren't meant to replace an actual operating system, but they're still very cool.

Of course, through the magic of cloud PCs in solutions like Windows 365, you can use a full OS experience on the web, but this usually costs money, and not a small amount of it. These projects are still great for the average user.

source
63

Google is providing updates on the issue on its Google Workspace Status Dashboard (Getty/iStock)

• Google has confirmed an issue with its email service after Gmail users complained that their mailbox wasn’t working properly.

• Gmail users have reported that promotional emails that are normally sent to a separate folder are flooding their inbox, along with a banner warning them to “be careful with this message.”

• Google addressed the issue in a blog post, writing, “We are experiencing an issue with Gmail beginning on Saturday, 2026-01-24 05:02 US/Pacific. We are aware that some Gmail users are experiencing misclassification of emails in their inbox and additional spam warnings.”

• The statement continued, “We are actively working to resolve the issue. As always, we encourage users to follow standard best practices when engaging with messages from unknown senders.”

• Google said it would provide updates on the issue, which one user labeled “e-mail armageddon.” The glitch came hours after Gmail users were warned about a password breach affecting up to 48 million logins.

source
64


Microsoft is aware of an alleged issue that leaves PCs unable to boot and requires manual recovery after installing the Windows 11 January 2026 Update.

Microsoft doesn’t know how the January 2026 Update broke some PCs and is collecting data from consumers and IT admins. For now, you don’t have to uninstall the update, as the issue is “limited” to specific PCs. The same update also broke Outlook Classic, customization in File Explorer, sleep mode (S3), Citrix Director, and Remote Desktop.

“Microsoft has received a limited number of reports of an issue in which devices are failing to boot,” Microsoft noted in a support document first spotted by Windows Latest.

It’s unclear how many users are affected, but Microsoft has listed two affected platforms on the Windows release dashboard:

• KB5074109 – Windows 11 25H2

• KB5074109 – Windows 11 24H2

KB5074109 is a mandatory security update for Windows 11 25H2 / 24H2, and it patches as many as a hundred known security issues, which is why it’s installed automatically on PCs.

Do I have the January 2026 Update? Open Settings > System > About > Specification, and look at the build number. If it’s 26200.7623, you have the January update. KB5074109 was released on January 13, 2026.



According to Microsoft, affected PCs could suddenly stop booting and land on the Black Screen of Death (BSOD) error with stop code UNMOUNTABLE_BOOT_VOLUME.



The UNMOUNTABLE_BOOT_VOLUME error (Stop Code 0xED) is typically related to system corruption, a damaged BIOS/boot, or hardware failure, specifically the drive. In this case, Microsoft suspects the problem is likely due to the Windows 11 January 2026 Update.

“Microsoft has received a limited number of reports of an issue in which devices are failing to boot with stop code ‘UNMOUNTABLE_BOOT_VOLUME’ after installing the January 2026 Windows security update (the originating KBs listed above), released January 13, 2026, and later updates,” Microsoft explained.

“Affected devices show a black screen with the message ‘Your device ran into a problem and needs a restart. You can restart.’ At this stage, the device cannot complete startup and requires manual recovery steps.”

In other words, if you end up hitting the above Black Screen of Death error, it will leave your computer unable to boot, and you’ll need to recover the installation. Windows Recovery is typically successful, but there are situations where WinRE does not work. In that case, you can use an ISO to clean install Windows.

“Reports received so far indicate that this issue is limited to physical devices only; no customers have reported observing these symptoms on virtual machines,” Microsoft warned in the support document.

The good news is that only a limited set of devices is affected. The bad news is that Microsoft doesn’t know how many users are affected or the details of the configuration causing the issue. The worst news is that the Windows 11 January 2026 Update is causing a bunch of other problems, and Microsoft has issued an emergency update (KB5078127).

If you don’t have issues, there’s nothing to worry about. There are billions of PCs running Windows, and most issues are limited to specific hardware. This might be one of those “limited” issues only, but if your PC is unable to boot or something feels odd over the last ten days, it’s likely due to Windows 11 KB5074109.

Issue detail   Current status   Workaround   Affected Windows version

Outlook Classic freezes.   Acknowledged by Microsoft   Fixed in out-of-band update (KB5078127)   All supported versions of Windows

Third-party apps become unresponsive.   Acknowledged by Microsoft   Fixed in out-of-band update (KB5078127)   All supported versions of Windows

Black screen or wallpaper resets.   Not officially acknowledged   Restart Windows or reapply wallpaper manually   Windows 11 25H2, 24H2

Sleep mode (S3) stops working on older PCs.   Not officially acknowledged   No reliable workaround available   Windows 11 24H2 / 25H2 on systems using S3 sleep

Desktop.ini broken in File Explorer.   Not officially acknowledged   No workaround; folders still function but UI is incorrect   Windows 11 25H2, 24H2

Citrix Remote Desktop not working   Acknowledged by Citrix   Remove the update or switch to alternatives   Windows 11 25H2, 24H2 and Windows Server 2025, 2022

Remote Desktop stops working.   Acknowledged by Microsoft   Fixed in first out-of-band update (KB5077744)   All supported versions of Windows

Shutdown feature does not work properly.   Acknowledged by Microsoft   Fixed with first out-of-band update (KB5077797)   23H2

System fails to boot   Acknowledged by Microsoft   Use Windows Recovery or reinstall Windows using an ISO   25H2 and 24H2

source
65
Including Financial Accounts, Instagram, Facebook, Roblox, Dating Sites, and More.

Cybersecurity Researcher Jeremiah Fowler uncovered a data leak of 149 million logins and passwords, and shared his findings with ExpressVPN. We are publishing his report to help the public stay informed and protected as part of our ongoing effort to highlight important security risks.

The publicly exposed database was not password-protected or encrypted. It contained 149,404,754 unique logins and passwords, totaling a massive 96 GB of raw credential data. In a limited sampling of the exposed documents, I saw thousands of files that included emails, usernames, passwords, and the URL links to the login or authorization for the accounts. This is not the first dataset of this kind I have discovered and it only highlights the global threat posed by credential-stealing malware. When data is collected, stolen, or harvested it must be stored somewhere and a cloud based repository is usually the best solution. This discovery also shows that even cybercriminals are not immune to data breaches. The database was publicly accessible, allowing anyone who discovered it to potentially access the credentials of millions of individuals.

The exposed records included usernames and passwords collected from victims around the world, spanning a wide range of commonly used online services and about any type of account imaginable. These ranged from social media platforms such as Facebook, Instagram, Tiktok and X (formerly Twitter), as well as dating sites or apps, and OnlyFans accounts indicating login paths of both creators and customers. I also saw a large number of streaming and entertainment accounts, including Netflix, HBOmax, DisneyPlus, Roblox, and more. Financial services accounts, crypto wallets or trading accounts, banking and credit card logins also appeared in the limited sample of records I reviewed.

One serious concern was the presence of credentials associated with .gov domains from numerous countries. While not every government-linked account grants access to sensitive systems, even limited access could have serious implications depending on the role and permissions of the compromised user. Exposed government credentials could be potentially used for targeted spear-phishing, impersonation, or as an entry point into government networks. This increases the potential of .gov credentials posing national security and public safety risks.

The database had no associated ownership information so I reported it directly to the hosting provider via their online report abuse form. I received a reply several days later stating that they do not host the IP and it is a subsidiary that operates independently while still using the parent organization's name. It took nearly a month and multiple attempts before action was finally taken and the hosting was suspended and millions of stolen login credentials were no longer accessible. The hosting provider would not disclose any additional information regarding who managed the database, it is not known if the database was used for criminal activity or if this information was gathered for legitimate research purposes or how or why the database was publicly exposed. It is not known how long the database was exposed before I discovered and reported it or others may have gained access to it. One disturbing fact is that the number of records increased from the time I discovered the database until it was restricted and no longer available.

Breakdown of Email Providers (estimated)

   ○ 48M - Gmail

   ○ 4M - Yahoo

   ○ 1.5M - Outlook

   ○ 900k - iCloud

   ○ 1.4M - .edu

Other notable accounts included:

   ○ 17M - FaceBook

   ○ 6.5M - Instagram

   ○ 780k - TikTok

   ○ 3.4M - Netflix

   ○ 100k - OnlyFans

   ○ 420k - Binance



This screenshot shows the total count of records and size of the exposed infostealer database.



This image shows screenshots of accounts and credentials including Instagram, Google accounts, and OnlyFans.



This image shows screenshots of accounts and credentials including Facebook, a government account from Brazil, and a WordPress administrative login.



This screenshot shows how the index was searchable using nothing more than a web browser.

The database appeared to store keylogging and “infostealer” malware, a type of malicious software designed to silently harvest credentials from infected devices. These files were different from previous infostealer malware datasets that I have seen because it logged additional information. The records also included the “host_reversed path” formatted as (com.example.user.machine). This structure is used to create an easily indexable way to organize the stolen data by victim and source. Reversing the hostname can also help avoid directory conflicts or as an attempt to bypass basic detection rules that look for standard domain formats. The system used a line hash as the document ID to ensure one unique record per unique log line. In a limited search of these hash and document IDs it was identified that they were indeed unique and returned no duplicates.

Potential Risks of Exposed Credentials

The exposure of such a large number of unique logins and passwords presents a potentially serious security risk to a large number of individuals who may not know their information was stolen or exposed. Because the data includes emails, usernames, passwords, and the exact login URLs, criminals could potentially automate credential-stuffing attacks against exposed accounts including email, financial services, social networks, enterprise systems, and more. This dramatically increases the likelihood of fraud, potential identity theft, financial crimes, and phishing campaigns that could appear legitimate because they reference real accounts and services.

How to Protect Your Accounts, Credentials, and Privacy

By now most of us are aware that malware can be spread through a range of different methods including malicious email attachments, fake software updates, compromised browser extensions, and even deceptive advertisements. Once the device is infected the malware can run undetected and harvest and transmit credentials. If the device is infected with malware simply changing passwords does no good because the new password will also be captured. Having antivirus software installed on your device is a good first line of defense and your best bet in identifying and removing malware. A report published in October identified that only an estimated 66 percent of U.S. adults used antivirus software in 2025. This means there are a large segment of users with unprotected and potentially vulnerable devices to this type of infostealer malware.

Anyone who suspects their device may be infected with malware should take immediate action. On a mobile device, I recommend updating the operating system and security software (if installed). If you don’t have security software, install it and scan the device to remove anything that is identified as malicious or flagged as suspicious. Updating the operating system can patch known vulnerabilities and having the latest versions of security software can also improve detection methods. Additionally, review app permissions, keyboard settings, accessibility, and device admin access. As a general rule, only install apps from official app stores. On a computer Windows/macOS/Linux etc, even non-technical users can conduct a deeper review of programs, browser extensions, and running processes to identify unknown or suspicious activity and software.

Using a password manager can reduce some of the risks from basic infostealer malware and keyloggers. Most password managers store passwords and often auto fill credentials and while this can prevent simple keystroke loggers from capturing typed passwords it is not immune from other more advanced malware. Password managers encrypt data and ensure MFA, while this helps to improve overall account security they do not protect against fully compromised systems. There are additional ways infostealer malware can collect or harvest data. This includes capturing clipboard contents, scraping browser memory, stealing session cookies and tokens, or intercepting form data before it is encrypted. Password managers have many positive benefits and do help improve security against password reuse and basic keylogging, but they cannot defend against all variants of advanced malware. When combined with a good antivirus, endpoint security, and regular OS updates it is a safer option than nothing.

From a privacy perspective, the breach of exposed email addresses and account associations could allow criminals to build detailed profiles of individuals. Knowing where they have accounts, what services they use, and potentially their professional or personal affiliations could hypothetically increase the success rate of social engineering or phishing attempts. Most people keep sensitive documents and communications in their email history without realizing how big of a risk it could be if someone gained unauthorized access. An account takeover could have serious privacy implications depending on the type of the account or service. Unauthorized access to images and chat histories from dating profiles or adult entertainment accounts could potentially create risks years after the incident, including harassment or extortion attempts.

After any data breach or even as a preventative measure it is a good idea to review and update account security measures. This includes enabling two-factor authentication or biometric protections when they are available. Although extra steps are not always convenient, adding an additional verification step can help prevent unauthorized access of accounts by criminals using compromised passwords. It is also a good idea to review login history, login locations, devices, and any failed login attempts. As a general rule never reuse passwords across different sites, applications, or services. Taking these basic steps can help protect against or prevent an account compromise.

While it may seem ironic that cybercriminals themselves would leave such a valuable cache of stolen data unsecured, researchers note that this is not uncommon. Criminal operations often prioritize speed and scale over operational security, storing data in misconfigured cloud servers or databases that can be discovered through routine internet scanning. Once exposed, such datasets are frequently copied and redistributed, making the damage difficult to reverse.

The discovery of this unprotected database serves as another reminder that credential theft has become a large-scale business that will only continue to be a threat. As criminals continue to refine their tools, technology, and methods it is more important now than ever to use antivirus software, strong authentication, unique passwords, and basic cyber hygiene. For hosting providers I would recommend providing effective abuse reporting channels that are reviewed by humans. Failure to respond to responsible disclosure reports of clear violations of terms of service such as hosting malware or stolen credentials only enables malicious infrastructure to remain active, exposing individuals to serious potential risks.

I make no allegations or claims of wrongdoing by the hosting provider or IP owner, nor against any of their staff, representatives, partners, affiliates, or associated entities. I am not asserting that internal systems or user information were ever in immediate danger. Any potential data-exposure scenarios discussed in this report are purely hypothetical and presented solely for educational and informational purposes; they should not be interpreted as evidence of, or implications about, an actual breach or loss of data integrity. Nothing in this report should be taken as an assessment or critique of any organization’s specific security controls, infrastructure, or operational practices.

As an ethical security researcher, I do not download or retain exposed data. My interaction is limited to capturing a minimal number of screenshots strictly necessary to confirm and document the issue. While the database was exposed it was possible to run search queries using only a web browser. I take no actions beyond identifying the vulnerability and responsibly notifying the appropriate parties. I expressly disclaim responsibility for any actions taken by others in response to this disclosure. The publication of these findings is intended only to promote awareness around data protection and privacy risks, with the goal of encouraging organizations to adopt proactive safeguards to prevent unauthorized access to sensitive information.

source
66
Without Linux, there is no ChatGPT. No AI at all. None. Here's why.

Modern AI began with open source, and it ran on Linux. Today, Linux isn't just important for artificial intelligence; it's the foundation upon which today's entire modern AI stack runs. From hyperscale training clusters down to edge inference boxes, it's all Linux from top to bottom.

AI's magic tricks are really the aggregate output of very prosaic infrastructure: supercomputers, GPU farms, and cloud clusters that almost all run some flavor of Linux. The core machine-learning frameworks -- TensorFlow, PyTorch, scikit-learn, and friends -- were all developed and tuned first on Linux. Tooling around these tools, from Jupyter and Anaconda to Docker and Kubernetes, is similarly optimized for Linux.

Why IT jobs will live and die on Linux

Why? Because it's on Linux where researchers and production engineers actually deploy AI. Future IT jobs will live and die on Linux.

You see, AI runs on Linux because it's the most flexible, powerful, and scalable environment for the GPU‑heavy, distributed workloads modern AI requires. In addition, the entire tooling and cloud ecosystem has standardized on Linux.

Yes, every AI platform, whether it's OpenAI, Copilot, Perplexity, Anthropic, or your favorite AI chatbot, is built on Linux, plus drivers, libraries, and orchestration, all glued together in different ways. The proprietary bits may grab the branding, but without Linux, they're nowhere.

That translates into more Linux jobs.

As the Linux Foundation's 2025 State of Tech Talent Report noted, AI is driving a net increase in tech jobs, particularly Linux jobs. What this looks like comes down to "AI [is] reshaping roles rather than eliminating them," according to the report, "leading to shifts in skill demand and new opportunities for workforce growth."

Besides increasing Linux system and network administration jobs, the site Linux Careers sees "a rapidly emerging trend involving professionals who combine Linux expertise with artificial intelligence and machine learning operations." Such new AI/Linux jobs include AI Operations Specialist, MLOps Engineer, ML Engineer, and DevOps/AI Engineer.

Of course, Linux distributors know all this, which is why, when new Linux distros are released, their makers emphasize AI features.

For example, Canonical and Red Hat are racing to plant their Linux flags on Nvidia's new Vera Rubin AI supercomputer platform. The race is on to see who will own the operating system layer of "gigascale AI factories."

For its part, Red Hat is introducing Red Hat Enterprise Linux (RHEL) for Nvidia. This curated edition of RHEL is optimized specifically for Nvidia's Rubin platform, including the Vera Rubin NVL72 rack-scale systems.

The company says this variant will ship with Day 0 support for the Vera CPU, Rubin GPUs, and Nvidia's CUDA X stack, with validated OpenRM drivers and toolkits delivered directly through Red Hat repositories.

The Linux kernel and AI

Canonical is also rolling out official Ubuntu support for the Nvidia Rubin platform, also targeting the Vera Rubin NVL72. The London-headquartered company is anchoring its story around making the custom Arm-based Vera CPU a "first-class citizen," with x86 parity in its forthcoming Ubuntu 26.04 release.

So, unlike Red Hat, which has a RHEL just for Nvidia's processors, the new Ubuntu will support Nvidia. This version will also upstream features such as Nested Virtualization and ARM Memory Partitioning and Monitoring (MPAM) to better partition memory bandwidth and cache for multi-tenant AI workloads.

What runs all this is a Linux kernel that has been steadily modified to keep up with AI's voracious appetite for hardware acceleration. Modern kernels juggle GPU and specialized accelerator drivers, sophisticated memory management for moving tensors around quickly, and schedulers tuned for massively parallel batch jobs.

In short, the kernel has been rewired over the last decade to become an operating system for AI hardware accelerators.

Memory: putting data where the GPUs are

Specifically, one of the most important enablers has been Heterogeneous Memory Management. This enables device memory, such as Graphics Processing Unit/Video Random Access Memory (GPU VRAM), to be integrated into Linux's virtual memory subsystem.

That, combined with Direct Memory Access Buffering (DMA-BUF) and Non-Uniform Memory Access (NUMA) optimization, enables AI runtimes to keep tensors close to the accelerator and cut back on data copying, which tends to slow down performance.

Recent kernels also treat advanced CPU-GPU combinations, such as tightly coupled NUMA-style CPU/GPU nodes, as first-class citizens. With this, memory can be migrated between CPU-attached RAM and high-bandwidth GPU memory on demand.

This, as Nvidia explained, "enables the CPU and GPU to share a single per-process page table, enabling all CPU and GPU threads to access all system-allocated memory."

Accelerators: a real subsystem, not an add-on

Linux now has a dedicated compute accelerators subsystem that's designed to expose GPUs, Tensor Processing Units (TPUs), and custom AI application-specific integrated circuits (ASICs) to your AI and machine learning (ML) programs.

On top of that, GPU support has matured from graphics-first to compute-heavy, via the Direct Rendering Manager (DRM), open stacks like ROCm and OpenCL, and Nvidia's Compute Unified Device Architecture (CUDA) drivers.

Kernel work has expanded to cover newer AI accelerators such as Intel's Habana Gaudi, Google's Edge TPU, and FPGA/ASIC boards, with drivers and bus abstractions. This enables AI programs such as PyTorch or TensorFlow to see and use them as just another device. Thus, anyone making new AI silicon today rightly assumes that Linux will be running on it.

Scheduling: feeding hungry accelerators

Linux's default scheduler, the Earliest Eligible Virtual Deadline First (EEVDF), real-time scheduler, and NUMA balancing have all been tuned to enable AI workloads to pin CPUs, isolate noisy neighbors, and feed accelerators without jitter. Work on raising the default kernel timer frequency from 250 Hz to 1000 Hz is already showing measurable boosts in Large Language Model (LLM) acceleration with negligible power cost.

While not a Linux default setting, some distros, like the Ubuntu low-latency kernels, now come with this as a standard setting.

Direct paths: cutting out the CPU middleman

Modern kernels allow GPUs to access memory, storage, and even peer devices directly, using technologies such as Nvidia's GPUDirect and peer-to-peer DMA. Combined with Compute Express Link (CXL) and improved Input/Output Memory Management Unit (IOMMU) handling, it enables accelerators to bypass the CPU when moving data. This eliminates bottlenecks that previously stalled ML training runs. This invisible plumbing is why AI clusters can scale out without collapsing under their own I/O.

What all this adds up to is that, when executives talk about "AI strategy," what they're not saying is that the unglamorous reality is that AI strategy depends on managing Linux at scale. It's all about patching kernels, hardening containers, and securing opaque workloads. AI may get the headlines, but Linux remains the operating system doing the actual work.

source
67


Well friends and true believers, the day is finally here. A new Windows phone has arrived. Thanks to Nex Computing and its NexPhone, a new smartphone is coming to market that dual boots Windows and Android, and it can even run desktop Linux when it's docked.

We are so back.

It runs full Windows on Arm, of course, since there's no actual mobile version of Windows 11. However, Nex designed a full skin to make it look like the Windows Phone UI that we all remember and love. Not only is it fit with transparent tiles, but it includes familiar actions like swiping left for an all apps list.

A phone that's designed to be used as a PC
It's meant to be your only computer





If you're an old Windows Phone fan like I am, you probably remember Nex Computing, or more specifically, the NexDock. It was a laptop-style device that you could plug a phone into and turn it into a PC, thanks to Windows 10 Mobile's Continuum feature.

In its announcement, founder and CEO Emre Kosmaz talks about how this was always the dream, one device that can be your only computer. You could probably say it's not even a phone, and more of an ultramobile PC that happens to include telephony.

He shared a concept video from 2012.


In a small meeting room in the Las Vegas Convention Center at CES 2026, or PC Hardware Segment Lead Rich Pinnock-Edmonds and I got to meet with Kosmaz, and he demoed the NexPhone for us. There's nothing on the market like it.

In fact, there isn't actually supposed to be anything on the market like it. Under the hood, there's a Qualcomm Dragonwing QCM6490 (a modified Snapdragon 778G), rather than a Snapdragon X2 Elite or something more mobile-friendly. The reason is because it's the only processor that supports Windows, Android, and Linux. It's not even meant for full desktop Windows



As you'd expect, it does what it says. When connected to a dock, you get a desktop environment. It can be Windows or Android, which you'll have to boot into, and you can launch Debian Linux from Android.

On mobile, Windows doesn't shine quite as much as it once did. While the mobile UI is fantastic, there isn't much that can be done for the fact that Windows apps simply do not have the responsive design to adapt to smaller screens like they once did under UWP. So, while the UI is familiar, launching an app on the phone isn't too pleasant.

The NexPhone is coming in Q3
And it's relatively inexpensive



I know what you're thinking. When will I be able to buy the first phone running Windows in nearly a decade? Sadly, you'll have to wait a while longer, as it's coming in Q3.

It'll set you back $549, which feels inexpensive given that Nex has developed a truly unique product with the NexPhone. You can reserve it starting today for $199 (refundable), with the other $350 due when it ships.

Other specs include a 6.58-inch 1080p LCD, 12GB RAM, 250GB storage with microSD expansion, a 5,000mAh battery, and dual rear cameras with a 64MP main sensor and a 13MP ultra-wide sensor



source
68
Windows on ARM / Nvidia prepares multiple Arm-based chips for 2026 and 2027
« Last post by javajolt on January 21, 2026, 02:13:16 AM »
First-gen could debut with Windows 11 26H1



Nvidia hasn’t given up on its plans to ship a Windows on Arm chip this year. Supply-chain sources claim NVIDIA is still planning a Windows on Arm chip, with N1X-based laptops expected as early as Q1 2026. It will likely come with Windows 11 26H1 out of the box, as Windows Latest previously reported that this particular OS release is for new Silicon.



A Digitimes (Chinese) report based on supply-chain chatter says NVIDIA is trying to expand beyond GPUs and push deeper into PCs, especially Windows on Arm (WoA) laptops. The same roadmap also talks about newer chips after N1/N1X, moving toward N2 and N2X in 2027.

NVIDIA has not confirmed these timelines, and it usually avoids commenting on supply-chain leaks.

What are N1 and N1X Nvidia “AI PC” chips?

While N1 is likely for desktops, N1X is for notebooks, and Nvidia reportedly plans to announce N1X-based laptops running Windows 11 26H1 in Q1 (by the end of March 2026). Initially, Nvidia is focusing on consumer models, but there are plans for other variants, and we could see those PCs in Q2 2026.



N1X isn’t just a rumor, because NVIDIA is already using it in DGX Spark. The report says DGX Spark is based on N1X and includes the GB10 “superchip” with 128GB unified memory. Supply-chain sources also claim the same N1X platform will appear in Windows on Arm laptops as early as Q1 2026, including consumer models.

Multiple OEMs (Acer, Asus, Dell, Gigabyte, HP, Lenovo, MSI) are reportedly building their own DGX Spark systems.

According to Digitimes, Nvidia’s N1X notebooks were supposed to debut in late 2025, but they were pushed to 2026 due to Microsoft OS timing. It appears that Digitimes is referring to recent platform changes, which will begin shipping with Windows 11 26H1 in the coming months.



For those unaware, Microsoft officially confirmed that Windows 11 26H1 is for new Silicon, but it never said whether it’s only for Snapdragon X2 PCs.

“26H1 is not a feature update for version 25H2 and only includes platform changes to support specific silicon,” Microsoft noted in a blog post published in November 2025. 26H1 does not have exclusive features, but it’s based on a new platform release, which means it could include N1X and Snapdragon X2-related optimizations.

The report also claims that N1X chips were delayed due to weaker or uncertain notebook demand, Memory supply and pricing problems, which matter a lot for unified-memory designs.

Either way, it looks almost certain we’ll see Nvidia’s first Arm-based laptops in 2026.

More importantly, Nvidia is also working on N2 and N2X, which would be the next generation, with products launching starting around Q3 2027.

source
69
Almost exactly a year ago, Microsoft shared details regarding the hardening process of Domain Controllers (DCs) to protect them against a couple of security flaws in Kerberos. Now, it is kicking off yet another hardening phase to patch DCs against security issues recently reported via CVE-2026-20833.

Basically, there is a vulnerability in the Kerberos authentication protocol that allows an attacker to exploit weak and legacy encryption algorithms like RC4 and procure service tickets that enable them to steal credentials for service accounts. This exploit is tagged as CVE-2026-20833, and applies to DCs running the following SKUs of Windows Server:

   • Windows Server 2008 Premium Assurance

   • Windows Server 2008 R2 Premium Assurance

   • Windows Server 2012 ESU

   • Windows Server 2012 R2 ESU

   • Windows Server 2016

   • Windows Server 2019

   • Windows Server 2022

   • Windows Server 2025

To mitigate this issue, Microsoft has rolled out a few changes via the recent Patch Tuesday update. Right now, customers are in the "Initial Deployment Phase," during which the Redmond tech giant has released Windows updates that provide audit events for customers who might face compatibility issues due to the hardening process. It has also introduced an  RC4DefaultDisablementPhase registry value to proactively enable DCs to use the AES-SHA1 algorithm when it is safe to do so.

This phase will continue until April 2026, at which point we'll enter the "Second Deployment Phase" that empowers DCs to utilize AES-SHA1 for accounts that do not have an explicit msds-SupportedEncryptionTypes active directory attribute defined.

Finally, in July 2026, Microsoft will begin the "Enforcement Phase" that gets rid of the RC4DefaultDisablementPhase registry subkey.

In its dedicated support article, Microsoft has encouraged IT admins to apply January 2026's Patch Tuesday updates and begin actively monitoring audit events to see if they are ready to kick off the next phase of DC hardening. You can find out more details here.

source
70
If you are a long-time Neowin reader, chances are you may be amongst those Windows users who had noticed a curious behavior: holding the Shift key while restarting doesn’t trigger a full cold reboot; instead, the system would do something slightly different.

For those not familiar, when a user held down the Shift key while restarting Windows 95, the system behaved differently than during a full cold reboot. Instead of cycling the hardware completely, Windows displayed “Windows is restarting” and attempted what was essentially a fast-restart. In a way, this was kind of like Fast Startup, which Microsoft introduced much later in Windows 8. If you attempt a Shift + Restart on Windows 11 and 10 you get into Windows Recovery Environment (WinRE).

Veteran Microsoft Windows developer Raymond Chen has explained how this worked. Chen, in his newly penned article on his The Old New Thing column, notes that this behavior was part of the old 16‑bit ExitWindows function when it received the EW_RESTARTWINDOWS flag.

If you are wondering, the ExitWindows function is a legacy function used to log off the interactive Windows user, while the EW_RESTARTWINDOWS parameter, as the name suggests, is used to restart the system.

Chen has explained that the shut down sequence began first with the 16‑bit Windows kernel itself, followed by the 32‑bit virtual memory manager, and then the CPU dropping back into real mode.

After this, control returned to the bootstrap program "win.com" with a special signal “Can you start protected mode Windows again for me?” thus instructing it to relaunch protected‑mode Windows. Hence, the code in win.com would then display the “Please wait while Windows restarts…” message as it tried to get the system back up as requested.

If you are trying to make sense of it, Win.com was essentially the executable file used to load different Windows versions based on DOS, like Windows 95. Meanwhile, Real mode Windows is an early design meant to run on PCs with minimal resources, like 192 KB of RAM and floppy drives, and Protected mode Windows is like the full OS version, with memory protection, GUI, and all.

Chen notes that by its nature of design, .com files claimed all conventional memory at launch, but in the case of win.com, it would release unused space to create one large contiguous block for protected‑mode Windows. So if another program had fragmented that memory space, the fast restart could not succeed, and win.com fell back to a full reboot. Otherwise, the fast restart continued as it re‑created the virtual machine manager and launched the graphical user interface (GUI), giving the user the impression of a seamless fast restart.

However, the process was not flawless as Raymond Chen adds, since some users reported that attempting two fast restarts in succession would lead to crashes, while others seemingly managed multiple fast restarts without issue. The likely explanation was that certain device drivers failed to reset properly, leaving corrupted memory that only revealed itself during shutdown.

source
Pages: 1 ... 5 6 [7] 8 9 10