Union Information Technology Minister Ashwini Vaishnaw recently explained how he and his ministry were working to build an all-inclusive semiconductor ecosystem in India, which would align with Prime Minister Narendra Modi's "Make in India" vision. In a four minute video shared on X (formerly Twitter), Vaishnaw could been seen explaining the different components involved in the ...
AI experts warn U.S. military: China has caught up to America in key areas of tech race
AI experts warn U.S. military: China has caught up to America in key areas of tech race Gait recognition is just one part of China's major push to develop data-driven artificial intelligence surveillance. Artificial intelligence specialists warned the Defense Department on Thursday that China has caught up in the AI arms race and has even pulled ...
More guidance needed on AI in schools, report says
A quarter of all children are now using generative AI tools to help with schoolwork, according to a new study. Research from online safety charity Internet Matters found that over half of 13-to-14-year-olds were actively engaging with AI chatbots, and that 41% of children believe AI tools will be beneficial to their education. But parents are more ...
Proud moment::PM names 4 astranauts for manned gaganyan mission
After keeping their identity under wraps for almost five years, India, on February 27, introduced before the world its four astronaut-designates for the country's first manned space mission Gaganyaan, expected to take flight by 2025. Prime Minister Narendra Modi revealed the names of Group Captains Prasanth Balakrishnan Nair, Ajit Krishnan and Angad Pratap, and Wing ...
Beware of all electronic gadgets in office and homes..china might be using them for hacking
The Chinese state-linked group I-Soon was seen offering modified versions of popular power banks, internet routers and USB ports as "attack systems" to its potential clients, according to the documents reviewed by India Today. Once installed and connected to a local network, these devices could be used to eavesdrop on information and steal intellectual property and ...