<p>RSA25 Mar 2026 | 8</p>
<h4>Meta cuts about 700 jobs as it shifts spending to AI</h4>
<p>Forget the metaverse</p>
<p>AI + ML25 Mar 2026 | 16</p>
<h4>Oracle: AI agents can reason, decide and act – liability question remains</h4>
<p>Fusion Agentic Applications promise autonomous enterprise decisions. Gartner urges caution</p>
<p>Applications25 Mar 2026 | 9</p>
<h4>Trump remembers to appoint science panel, fills it mostly with tech bros</h4>
<p>Plus one actual physicist</p>
<p>Science25 Mar 2026 | 17</p>
<h4>OpenAI now gets to decide which type of product assassin it will become</h4>
<p>AWS, Google, Broadcom, or Netscape?</p>
<p>AI + ML25 Mar 2026 | 5</p>
<p>The Register Biting the hand that feeds IT</p>
<h4>About Us</h4>
<p>Contact us<br>
Advertise with us<br>
Who we are</p>
<p>Our Websites […] User indignation might be somewhat mitigated if GitHub users recognized that OpenAI’s Codex – used in GitHub Copilot – is "a GPT language model fine-tuned on publicly available code from GitHub." That verbiage shows the data-gorged AI horse is already out of the barn, so to speak.</p>
<p>Shutting the doors at this point won’t change the fact that the AI industry is built on data gathered without asking for a strong indicator of enthusiastic consent. ®</p>
<h4>More about</h4>
<p>AI<br>
Privacy<br>
Security</p>
<p>More like these</p>
<p>×</p>
<h3>More about</h3>
<p>AI<br>
Privacy<br>
Security<br>
Software</p>
<h3>Narrower topics</h3>
<p>2FA<br>
AdBlock Plus<br>
Advanced persistent threat<br>
AIOps<br>
App<br>
Application Delivery Controller<br>
Audacity<br>
Authentication<br>
BEC<br>
Black Hat<br>
BSides<br>
Bug Bounty<br>
Center for Internet Security<br>
CHERI<br>
CISO<br>
Common Vulnerability Scoring System<br>
Confluence<br>
cookies<br>
Cybercrime<br>
Cybersecurity<br>
Cybersecurity and Infrastructure Security Agency<br>
Cybersecurity Information Sharing Act<br>
Database<br>
Data Breach<br>
Data Protection<br>
Data Theft<br>
DDoS<br>
DeepSeek<br>
DEF CON<br>
Digital certificate<br>
Encryption<br>
End Point Protection<br>
Exploit<br>
Firewall<br>
FOSDEM<br>
FOSS<br>
Gemini<br>
Google AI<br>
Google Project Zero<br>
GPT-3<br>
GPT-4<br>
Grab<br>
Graphics Interchange Format<br>
Hacker<br>
Hacking<br>
Hacktivism<br>
IDE<br>
Identity Theft<br>
Image compression<br>
Incident response<br>
Infosec<br>
Infrastructure Security<br>
Jenkins<br>
Kenna Security<br>
Large Language Model</p>




