• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - internet
Tag:

internet

Tech

The iPhone changed the way Americans see the world

by Chief Editor May 12, 2026
written by Chief Editor

For nearly two decades, the smartphone has evolved from a luxury novelty into a digital appendage. What began in 2007 as Steve Jobs’ promise to “change everything” has manifested as a complex, love-hate relationship. We rely on these devices for everything from instant global communication to seamless payments, yet we find ourselves trapped in a relentless cycle of notifications that erode our attention spans.

As we move further into the era of integrated artificial intelligence, the question is no longer whether we can live without our phones, but whether we can reclaim our autonomy while keeping the convenience. The “talisman” is becoming a “tether,” and the industry is now racing to find a balance.

The Great Digital Paradox: From Tool to Tether

The modern smartphone experience is a study in contradictions. On one hand, it is an engine of unprecedented productivity. We can manage our entire professional and personal lives through a few taps on a screen. On the other, the “attention economy” has turned our devices into dopamine-delivery systems, utilizing variable reward schedules to keep us scrolling.

This paradox has created a societal tension. While the iPhone and its Android counterparts have democratized information and connectivity, they have also introduced a new form of digital fatigue. The challenge for the next decade is shifting the device’s role from a “pusher” of content to a curated tool for intentional living.

Did you know? Since the first iPhone’s debut in 2007, Apple became the first publicly traded U.S. Company to hit a $1 trillion market cap, proving that the “smartphone obsession” was not just a social phenomenon, but one of the most successful economic shifts in history.

The Rise of ‘Mindful AI’: Can Apple Intelligence Save Our Focus?

The next frontier of the smartphone is not necessarily more power, but more intelligence. With the introduction of Apple Intelligence and advanced AI integration in newer models like the iPhone 17 series, the goal is shifting toward cognitive offloading.

Filtering the Noise

Future trends suggest a move toward “agentic AI”—systems that don’t just notify you of every email, but summarize the essential points and prioritize only what truly requires your attention. By acting as a sophisticated filter, AI could potentially reduce the “notification anxiety” that currently defines the smartphone experience.

Predictive Utility over Reactive Scrolling

Instead of us seeking out the phone to solve a problem, the phone will anticipate the need. Imagine a device that knows your schedule and environment, silencing distracting apps automatically when you enter a “deep work” zone or a family dinner, effectively enforcing digital boundaries that we struggle to maintain ourselves.

Pro Tip: Reclaiming Your Attention
To combat the “pusher” effect, try auditing your notifications. Move from “Push” (where the app decides when to interrupt you) to “Pull” (where you check the app on your own terms). Setting specific “Focus Modes” on your device can help simulate the boundaries that AI will eventually automate.

Beyond the Glass Slab: The Post-Smartphone Era

The ultimate solution to screen addiction may be the disappearance of the screen itself. We are seeing a gradual migration toward ambient computing—technology that exists in the background of our lives rather than demanding our full visual attention.

View this post on Instagram about Smartphone Era
From Instagram — related to Smartphone Era

Wearables, augmented reality (AR) glasses, and neural interfaces are the likely successors to the handheld device. By distributing information across our field of vision or via audio cues, we may stop the habit of “looking down,” allowing us to engage more fully with the physical world while remaining connected.

This shift could alleviate the “digital river” effect described by AP News, where we are borne back ceaselessly into the glowing screen. If the interface becomes invisible, the addiction to the “glow” may finally fade.

Reclaiming the Human Connection

As technology becomes more pervasive, a counter-trend is emerging: the “Digital Detox” movement. From the rise of “dumbphones” (minimalist devices that only call and text) to legislation regarding smartphone use in schools, there is a growing recognition that constant connectivity comes at a cognitive cost.

How the iPhone changed the world in just 10 years

The future will likely see a hybrid approach. We will utilize high-powered AI for efficiency but intentionally carve out “analog zones” in our lives. The most valuable luxury of the future will not be the fastest processor, but the ability to be completely unreachable.

Frequently Asked Questions

Is smartphone addiction a recognized medical condition?

While not formally classified as a clinical addiction in all manuals, many psychologists recognize “problematic smartphone use” (PSU) as a behavioral addiction characterized by a lack of control over use and negative impacts on daily life.

How is AI changing the way we use phones?

AI is shifting the user experience from manual navigation (searching through apps) to intent-based interaction (asking a system to perform a task), which could either reduce screen time through efficiency or increase it through more engaging content.

What are the best ways to reduce screen time?

Effective strategies include using grayscale mode to make the screen less stimulating, setting strict app limits, and establishing “phone-free” areas in the home, such as the bedroom or dining table.

Join the Conversation

Do you feel the iPhone is a magical tool or a digital tether in your life? Have you found a way to balance connectivity with mental well-being?

Share your thoughts in the comments below or subscribe to our newsletter for more insights on the intersection of technology and humanity.

Subscribe Now

May 12, 2026 0 comments
0 FacebookTwitterPinterestEmail
Entertainment

Josh Hutcherson Doesn’t Hate Taylor Swift, Okay?

by Chief Editor April 21, 2026
written by Chief Editor

The Rise of the “Digital Tribe”: Why Not Liking a Pop Star is Now a Political Statement

When actor Josh Hutcherson mentioned he wasn’t a “Swiftie,” he didn’t just spark a debate about music tastes; he accidentally tripped a wire in the complex machinery of modern fandom. In a previous era, not liking a popular artist was a conversation starter at a party. Today, it can be perceived as a declaration of war.

View this post on Instagram about Digital, Hutcherson
From Instagram — related to Digital, Hutcherson

We are witnessing a shift where celebrity fandom is no longer about the art—it’s about identity. When a fan base evolves into a “digital tribe,” any criticism of the idol is interpreted as a personal attack on the collective identity of the group. This is the essence of hyper-identification, where the boundary between the fan’s ego and the celebrity’s brand completely disappears.

Did you recognize? The term “parasocial relationship” was coined in 1956 to describe the one-sided bond viewers form with media personalities. In the age of TikTok and Instagram, these relationships have intensified, making fans feel like they are “best friends” with stars they have never met.

The Parasocial Trap and the Death of Nuance

The backlash Hutcherson faced—including irrelevant personal attacks regarding his height—highlights a disturbing trend in online discourse: the total collapse of nuance. In the “stan” economy, there is no room for “no shade, all respect.” You are either an ally or an enemy.

Psychological data suggests that this tribalism is fueled by the brain’s desire for belonging. By defending a celebrity with militant fervor, users gain instant social capital within their online community. The “enemy” (in this case, someone who simply doesn’t enjoy a specific discography) becomes a convenient target to strengthen the internal bonds of the tribe.

From Fandom to Militancy: The Future of “Micro-Cancellations”

We are moving toward an era of “micro-cancellations.” While traditional cancel culture usually targets systemic abuse or moral failings, micro-cancellations target trivial preferences. Whether it’s a movie choice, a food preference, or a music taste, the internet is increasingly weaponizing the “wrong” opinion to perform collective shaming.

Looking ahead, we can expect this trend to expand beyond entertainment into every facet of lifestyle. As algorithms continue to push us into echo chambers, our tolerance for dissenting opinions—even harmless ones—will likely continue to shrink. We are essentially training ourselves to observe “difference” as “hostility.”

Industry experts suggest that this will lead to a “silence epidemic,” where public figures and everyday users alike stop sharing honest opinions to avoid the unpredictable wrath of a digital mob. This creates a sterile, performative online environment where everyone agrees, but no one is being honest.

Pro Tip: To protect your mental health in the age of digital tribalism, practice “selective engagement.” You don’t owe every online opinion a response. Recognizing when a conversation has shifted from a debate to a dogpile is the first step in maintaining your digital boundaries.

The Great Digital Retreat: The Search for Authentic Spaces

As the “main square” of the internet (platforms like X and public Instagram comments) becomes more toxic, a counter-trend is emerging: the retreat into “Digital Campfires.” These are smaller, gated communities—Discord servers, private group chats and niche forums—where people can express nuanced views without fear of a global pile-on.

Josh Hutcherson Responds to Hate From Taylor Swift Fans for Saying He is "Definitely Not a Fan.”

The future of social interaction will likely be a bifurcated experience. We will have our “Public Persona” for the algorithmic masses and our “Authentic Persona” for our trusted circles. The pressure to be a “Swiftie” or a “Hater” is a product of the public gaze; in private, most people still hold the nuanced view that you can respect an artist’s talent without wanting to listen to their album on repeat.

For more insights on how digital culture is reshaping our psychology, check out our guide on navigating digital wellness or explore the latest research on parasocial dynamics at Psychology Today.

Frequently Asked Questions

What is “Stan Culture”?

Derived from Eminem’s song “Stan,” it refers to an intense, often obsessive level of fandom that transcends simple admiration and becomes a core part of the fan’s identity.

Why do people attack others for their music tastes?

In a tribal digital environment, attacking a “non-believer” is a way for fans to signal their loyalty to the group and elevate their status within the fandom.

How can I avoid getting caught in a digital dogpile?

Avoid engaging with “bad faith” arguments. If a conversation moves from the topic (e.g., music) to personal attacks (e.g., appearance), it is no longer a discussion—it’s an attack. The best move is to disengage immediately.

Join the Conversation

Do you think we’ve lost the ability to disagree politely online, or is this just the fresh evolution of fandom? Let us know your thoughts in the comments below or subscribe to our newsletter for more deep dives into digital culture.

Subscribe Now

d, without any additional comments or text.
[/gpt3]

April 21, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Digital Iron Curtain: Russia Tightens Its Grip on the Internet

by Chief Editor March 20, 2026
written by Chief Editor

Russia’s Digital Iron Curtain: A Glimpse into the Future of Internet Control

Russia is rapidly reshaping its digital landscape, moving beyond temporary restrictions to establish a more permanent system of internet control. Recent mobile internet outages in major cities like Moscow and St. Petersburg, coupled with new legislation expanding state surveillance powers, signal a significant shift. This isn’t simply a reaction to the conflict in Ukraine. it’s a calculated strategy for long-term domestic control, drawing inspiration from models employed by China and Iran.

The Escalation of Digital Sovereignty

The Kremlin frames these measures as necessary for national security, citing threats like Ukrainian drone attacks and the non-compliance of foreign tech companies. However, analysts suggest a deeper motive: preventing the kind of instability that followed the Soviet war in Afghanistan and the collapse of the Soviet Union. The goal is to proactively tighten control before potential political or social unrest emerges.

This push for “digital sovereignty” involves not only restricting access to global platforms but also actively promoting state-backed alternatives. The promotion of MAX, a domestic platform for schools and universities, exemplifies this effort to create a controlled digital ecosystem. Simultaneously, the shutdown of hundreds of VPNs makes circumventing these restrictions increasingly difficult for citizens.

Learning from Authoritarian Playbooks

Russian officials have demonstrably studied the internet control strategies of China and Iran. These nations have successfully implemented systems that allow them to block large portions of the web while maintaining control over essential communications through state-approved channels. Russia appears to be aiming for a similar capability – the ability to manage information flows at will.

Did you know? China’s “Great Firewall” is a sophisticated censorship and surveillance system that blocks access to thousands of websites and apps. Iran similarly restricts access to social media platforms and utilizes a national intranet.

The Cat-and-Mouse Game with Citizens

Despite the increasing restrictions, many Russians, particularly younger users, continue to seek ways to access blocked content. The constant switching of VPNs highlights a growing dynamic between citizens and authorities. While the Kremlin aims to control the flow of information, a significant portion of the population remains determined to stay connected to the global internet.

The Risks of Excessive Control

The Kremlin faces a delicate balancing act. While tighter control may maintain short-term stability, excessive restrictions risk deepening public frustration, especially among digitally connected citizens. This could potentially undermine the very stability the Kremlin seeks to preserve.

What’s Next: A More Fragmented Internet?

Russia’s actions are part of a broader global trend toward internet fragmentation. More countries are exploring ways to exert greater control over their digital spaces, raising concerns about the future of a free and open internet. This could lead to a world where the internet is less interconnected and more divided along national lines.

Pro Tip: Staying informed about digital rights and privacy tools is crucial in an era of increasing online censorship. Resources like the Electronic Frontier Foundation (https://www.eff.org/) offer valuable information and advocacy.

FAQ

Q: What is “digital sovereignty”?
A: Digital sovereignty refers to a country’s ability to control its own digital infrastructure and data, often involving restrictions on foreign technology and platforms.

Q: Why is Russia restricting internet access?
A: The Kremlin cites security concerns related to the war in Ukraine and the refusal of some foreign tech companies to comply with Russian law, but analysts believe it’s also about long-term domestic control.

Q: Are other countries doing this?
A: Yes, countries like China and Iran have long-established systems for controlling internet access and censoring content.

Q: What does this mean for the future of the internet?
A: It could lead to a more fragmented internet, with different countries having different levels of access and control.

What are your thoughts on Russia’s digital control measures? Share your opinions in the comments below!

March 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Entertainment

Louis Theroux Manosphere: Ouders Alert!

by Chief Editor March 20, 2026
written by Chief Editor

The Rising Tide of the Manosphere: What Parents and Educators Necessitate to Grasp

A modern Netflix documentary, Louis Theroux: Inside the Manosphere, is sparking crucial conversations about a growing online subculture influencing young men. The documentary, released on March 11, 2026, investigates the network of influencers promoting ultra-masculine ideologies and “red pill” philosophies.

Decoding the Manosphere’s Appeal

The core message peddled by figures within the manosphere centers around achieving wealth and physical prowess as pathways to dominance in relationships. This narrative positions a “dominant man” as the ideal, contrasting him with a “slave to society.” This ideology, explored in the documentary through interviews with influencers like HSTikkyTokky, Sneako, and Myron Gaines, is gaining traction among young men online.

Mediapedagogue Jacqueline Kleijer highlights the concerning reality of these influencers becoming idols for young boys, comparable to sports stars like Messi or Ronaldo. This idolization is particularly potent given the significant amount of time young people spend online – sometimes up to 8-12 hours a day – increasing their exposure to these ideas.

What Exactly *Is* the Manosphere?

The manosphere isn’t a single entity, but rather a collection of websites, forums, social media accounts, and podcasts focused on masculinity and men’s roles. Active platforms include YouTube, TikTok, Reddit, and X. The central theme revolves around defining “manhood” and how men should interact with women, often manifesting as misogyny ranging from subtle disdain to openly sexist statements.

Social media algorithms exacerbate the problem. Once a user engages with content from the manosphere, they are quickly served similar, often more extreme, material, creating an echo chamber that reinforces these beliefs.

The Tactics of Influence and the Case of Andrew Tate

Influencers within the manosphere often employ sales tactics, framing themselves as gurus offering a path to success. HSTikkyTokky, for example, explicitly states that “selling is the most important skill,” positioning himself as a guide to achieving an “ultra-successful” lifestyle. Some, like Andrew Tate, promote financial schemes and cryptocurrency investments to their followers.

While Tate declined to participate in Theroux’s documentary, his ideology of hatred and contempt towards women heavily influences many within the manosphere. He currently faces allegations of rape, assault, and human trafficking and is reportedly in Hong Kong, with calls for his extradition to the UK.

Why Are Young Men Vulnerable?

Kleijer’s research indicates that adolescence is a critical period for vulnerability. Young men are often experimenting with identity and challenging societal norms. Without counter-narratives and open discussions at home and school, they can become trapped within these online echo chambers. The lack of opposing viewpoints online amplifies the impact of these ideologies.

The Disturbing Reality of Online Extremism

The documentary reveals the disturbing lengths to which some influencers will go to attract attention. One scene depicts a livestream where Sullivan and associates orchestrated a setup to humiliate and physically assault a man accused of abuse, with the violence broadcast to a captivated audience.

What Can Be Done?

The renewed attention brought by the Netflix documentary is a crucial opportunity for parents, educators, and policymakers. Open conversations with young people about these ideologies are essential. Encouraging critical thinking and providing alternative perspectives can help inoculate them against harmful influences.

Pro Tip

Ask your children what kind of content they are consuming online. Show genuine interest in their online world and create a safe space for them to discuss their thoughts and feelings.

FAQ

What is the “red pill”? The “red pill” is a metaphor derived from the film The Matrix, representing a supposed awakening to the “truth” about societal structures and gender dynamics, often involving misogynistic and conspiratorial beliefs.

Is the manosphere inherently dangerous? Exposure to the manosphere can be harmful, particularly for young men, as it promotes harmful stereotypes and potentially radicalizes individuals. However, experimentation with these ideas doesn’t automatically equate to endorsement.

How can I protect my child from the manosphere? Encourage open communication, promote critical thinking skills, and monitor their online activity. Be aware of the platforms they use and the influencers they follow.

Where can I learn more? Resources like the Nederlands Jeugdinstituut (NJi) offer information on the impact of the manosphere on young people.

Did you know? The documentary Louis Theroux: Inside the Manosphere is available globally on Netflix.

This documentary serves as a wake-up call. It’s time to address the growing influence of the manosphere and equip young people with the tools to navigate the complexities of online culture.

Want to learn more about online safety and youth development? Explore our other articles on digital wellbeing and responsible technology use.

March 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

A Pa. teen was internet-savvy entrepreneur. Now he’s an alleged bomber behind the NYC terror plot | National

by Chief Editor March 13, 2026
written by Chief Editor

From Sneaker Bots to Extremism: The Radicalization Pipeline of Online Youth

Emir Balat’s story – a Pennsylvania teen who went from building a lucrative sneaker resale business to allegedly plotting a bomb attack in Recent York City – is a chilling illustration of a growing concern: the radicalization of young people online. Balat, 18, and another teen were arrested after allegedly attempting to detonate homemade explosives near a protest, claiming inspiration from ISIS. But his journey wasn’t sudden. It began years earlier, with a knack for technology and a savvy understanding of online markets.

The Allure of Online Entrepreneurship and Early Digital Footprints

At 13, Balat wasn’t playing video games like many of his peers; he was coding. He developed a “bot” – automated software – to purchase limited-edition sneakers before they sold out, reselling them at a significant profit. Clients were willing to pay up to $400 for shoes that retailed for $200. This early success demonstrated a remarkable entrepreneurial spirit, but likewise established a digital footprint that would later reach under scrutiny. His username from the sneaker business was linked to a Roblox account created when he was 11, a platform increasingly recognized as a potential recruitment ground for extremist groups.

Roblox and the Gamification of Radicalization

Roblox, a world-building simulator, isn’t inherently dangerous. However, counterterrorism researcher Nicolas Stockhammer notes that platforms like Roblox, TikTok, and Twitch are becoming “an entry point” for Islamic radicals seeking to recruit young people. These platforms offer easily digestible video content and, crucially, communication channels – often leading to encrypted services like Telegram – where radicalization can occur more discreetly. The platform allows for the simulation of attacks, providing a space for potential recruits to explore violent ideologies.

The Perfect Storm: Isolation, Marginalization, and Online Echo Chambers

Experts suggest that recruiters often target second- or third-generation immigrant children, particularly those feeling marginalized or disconnected. These young people, often spending significant time alone online, are vulnerable to finding a sense of community and purpose within extremist groups. Balat’s online activity, while limited in visible signs of radicalization, showed an interest in computers, business, Islam, and Spanish – a complex mix that may have made him susceptible to certain narratives.

From Sneakers to Trades: A Shifting Online Persona

By 2024, Balat had moved on from sneakers, leveraging his online skills to sell home improvement supplies on Facebook Marketplace. He posted listings for everything from extension cords to nail guns, demonstrating a continued entrepreneurial drive. His Facebook header image featured a Quranic verse, hinting at a deepening religious focus. This shift in online activity, while not inherently suspicious, adds another layer to the puzzle of his alleged radicalization.

The Role of Fireworks and the Physical Manifestation of Extremism

The transition from online activity to physical action involved acquiring materials for bomb-making. Balat purchased a 20-foot roll of unhurried-burning fuse from a fireworks store just days before the attempted attack. This purchase, captured on surveillance footage, highlights the critical link between online radicalization and real-world violence. The fact that the devices were ultimately ineffective doesn’t diminish the seriousness of the intent.

The Case of Kayumi: A Lack of Clear Connection

The involvement of a second individual, Kayumi, remains somewhat unclear. Authorities have stated that the two may not have known each other well prior to the incident. Kayumi’s mother filed a missing person report on the day of the attack, suggesting a possible mental health crisis or a deliberate attempt to disappear. The lack of a clear connection between the two raises questions about the nature of their collaboration and the extent of any pre-planning.

Understanding the Digital Radicalization Landscape

Balat’s case isn’t isolated. It reflects a broader trend of young people being radicalized online, often through a combination of factors including social isolation, a search for identity, and exposure to extremist propaganda. The ease with which extremist groups can disseminate their message online, coupled with the anonymity afforded by the internet, creates a fertile ground for radicalization.

Pro Tip: Recognizing the Signs

Be aware of sudden changes in behavior, increased secrecy, and a growing obsession with online communities. Seem for signs of isolation, expressions of anger or frustration, and a rejection of mainstream values. Encourage open communication and provide support if you are concerned about someone you know.

FAQ: Online Radicalization and Youth

  • What platforms are most commonly used for radicalization? Platforms like TikTok, Twitch, Roblox, and encrypted messaging apps like Telegram are frequently used.
  • What are the warning signs of radicalization? Sudden changes in behavior, increased secrecy, isolation, and expressions of extremist views are potential warning signs.
  • How can parents protect their children from online radicalization? Open communication, monitoring online activity (respectfully), and educating children about online safety are crucial steps.
  • Is there a typical profile of a radicalized youth? No, radicalization can affect individuals from all backgrounds. However, those feeling marginalized or disconnected are particularly vulnerable.

Did you know? The FBI has seen a significant increase in investigations involving domestic terrorism in recent years, with a growing number of cases involving young people radicalized online.

This case underscores the urgent need for increased awareness, proactive intervention, and a collaborative approach involving law enforcement, educators, and parents to combat the growing threat of online radicalization. Further research into the specific pathways to radicalization and the effectiveness of counter-radicalization strategies is essential.

Explore further: Read more about the challenges of online extremism and the efforts to counter it here.

March 13, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Baltimore to add low-cost internet to 8 public housing complexes

by Chief Editor March 11, 2026
written by Chief Editor

This story was made possible through support from TEDCO, the Maryland Technology Development Corporation, which enhances economic empowerment growth through the fostering of an inclusive entrepreneurial innovation ecosystem. TEDCO identifies, invests in, and helps grow technology and life science-based companies in Maryland. Learn more at tedcomd.com.

Money Moves is a recurring series where we chart the raises, grants, contracts, mergers and other funding news of tech companies across our regions. Have a tip? Email us at [email protected].

Baltimore Bridges the Digital Divide with $22 Million Broadband Initiative

Baltimore City is taking significant steps to address digital equity, investing nearly $22 million to expand low-cost internet access to over 4,000 public housing units. This initiative, leveraging a local internet service provider, Port Networks, will offer residents internet service for just $20 a month – significantly less than the national average.

Fiber-Optic Future: A Model for Affordable Connectivity

The city’s strategy centers around utilizing its existing publicly owned fiber network. This approach allows providers to build upon established infrastructure, accelerating deployment and reducing costs. Leyla Layman, BCIT’s interim CIO, highlighted that this existing infrastructure will allow residents to receive broadband service faster than many other communities nationwide.

The success of a similar project at the Hammond at Greenmount Park development demonstrates the viability of this model. By avoiding the expense of building infrastructure from scratch, Baltimore is creating a blueprint for other cities seeking to close the digital divide.

Biotech Innovation Gains Momentum with ETC Investment

Beyond connectivity, Baltimore’s innovation ecosystem is receiving a boost through strategic investments. Emerging Technology Centers (ETC) Baltimore recently invested $200,000 in JuneBrain, a biotech company developing a novel device for diagnosing retinal and brain diseases. This marks ETC’s first investment in over a year and signals a renewed focus on supporting early-stage companies.

ETC will also provide JuneBrain with crucial commercialization support, including introductions to potential investors and technical guidance. This holistic approach – combining financial investment with mentorship – is critical for nurturing promising startups.

Maryland Invests $4 Million in AI and Cybersecurity Workforce Development

Recognizing the growing importance of artificial intelligence and cybersecurity, Governor Wes Moore is allocating $4 million to prepare Maryland’s workforce for these emerging fields. $2.5 million will fund workforce training programs in key industries, including life sciences and IT, while $1.5 million will support the establishment of cyber and AI clinics to serve schools, hospitals, and small businesses.

This investment will support training for approximately 600 aspiring cyber professionals through institutions like the Center for Critical Infrastructure Security, TCecure, and Howard Community College.

A Surge in Funding Across Maryland’s Tech Landscape

Recent funding activity demonstrates a vibrant and growing tech sector in Maryland. Several companies have secured significant investments, including:

  • 4MyCiTy: $50,000 to reduce local food waste.
  • Loyola University: $25,000 for Sunday Morning at Savannah’s, a bed and breakfast.
  • CraniUS: $20 million in Series B funding.
  • Cursive Technology: $125,000.
  • ApexQuantum: $200,000.
  • KnowledgeNet.ai: $500,000 from TEDCO’s Venture Fund.
  • POSTR Technologies: $1.9 million.
  • NanoBioFab: $200,000 through TEDCO’s Pre-Seed Builder Fund.

FAQ

Q: How much will internet access cost for residents in public housing?
A: Residents will be able to subscribe for $20 a month.

Q: What is ETC Baltimore?
A: ETC Baltimore is a subsidiary of the Baltimore Development Corporation that provides investment and support to early-stage companies.

Q: How is Maryland preparing its workforce for AI?
A: The state is investing $4 million in workforce training and cyber/AI clinics.

Q: What role is TEDCO playing in supporting Maryland’s innovation ecosystem?
A: TEDCO is providing funding and support to companies like KnowledgeNet.ai and NanoBioFab.


Maria Eberhart is a 2025-2026 corps member for Report for America, an initiative of The Groundtruth Project that pairs emerging journalists with local newsrooms. This position is supported in part by the Robert W. Deutsch Foundation and the Abell Foundation. Learn more about supporting our free and independent journalism.

March 11, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Kentucky Legislature easily overrides first Beshear veto, bill on fiber internet network | National

by Chief Editor March 11, 2026
written by Chief Editor

KentuckyWired Overhaul: A Sign of Shifting Power Dynamics and Broadband Battles

FRANKFORT, Ky. – A recent override of Governor Andy Beshear’s veto of House Bill 314 signals a significant shift in control over KentuckyWired, the state’s ambitious but troubled broadband project. The bipartisan legislative action, culminating in a 32-6 Senate vote and a 78-19 House vote, underscores growing frustration with the project’s escalating costs and delayed implementation.

The Roots of the Controversy: KentuckyWired’s Troubled History

Initiated by former Governor Steve Beshear and championed by U.S. Rep. Hal Rogers, KentuckyWired aimed to bring high-speed internet access to every corner of the Commonwealth. However, the project has faced persistent challenges, including cost overruns – now estimated at $1.5 billion – and significant delays. Critics argue that the original structure lacked sufficient oversight and accountability.

HB 314: A Restructuring of Power

House Bill 314 fundamentally alters the governance of KentuckyWired. It removes the network from the Governor’s office and places oversight with the Finance and Administration Cabinet and the Commonwealth Office of Technology (COT). The network authority board will now be chaired by the chief information officer of the Kentucky Department of Education, currently David Couch. This move prioritizes the needs of Kentucky schools, which account for 80% of the network’s current traffic.

The bill also replaces several cabinet secretaries on the board with the Secretary of State, State Treasurer, and Agriculture Commissioner. Governor Beshear will retain the ability to appoint two board members, selected from lists provided by the Kentucky League of Cities and the Kentucky Association of Counties.

Political Motivations and Constitutional Concerns

Governor Beshear vehemently opposed the bill, labeling it an “unconstitutional power grab.” He argued that the restructuring unfairly shifts appointment authority to Republican officeholders, particularly given that the network doesn’t directly serve their offices. The override demonstrates the Republican-controlled legislature’s willingness to challenge the Governor’s authority, a pattern observed throughout his tenure.

Senator Gex Williams, R-Verona, defended the move, emphasizing the need for greater accountability and cost control. He stated that the original structure was “costing more than planned while delivering less than expected.”

What This Means for Kentucky’s Broadband Future

The overhaul of KentuckyWired’s governance could have far-reaching implications for the state’s broadband expansion efforts. By placing the project under the oversight of agencies with technical expertise, lawmakers hope to accelerate implementation and ensure more efficient use of taxpayer dollars. However, the political nature of the change raises questions about potential delays or further complications.

The recent retirement of KentuckyWired’s executive director, Doug Hendrix, adds another layer of uncertainty to the project’s future. Finding a qualified leader to navigate these changes will be crucial.

FAQ: KentuckyWired and the Recent Legislative Changes

  • What is KentuckyWired? KentuckyWired is a state-funded broadband network designed to provide high-speed internet access throughout Kentucky.
  • Why was Governor Beshear’s veto overridden? Lawmakers believe the restructuring will improve oversight and accountability for the project, which has faced cost overruns and delays.
  • Who will now oversee KentuckyWired? The Finance and Administration Cabinet and the Commonwealth Office of Technology will have oversight, with a board chaired by the CIO of the Kentucky Department of Education.
  • What is the estimated cost of KentuckyWired? The project is expected to cost approximately $1.5 billion.

Pro Tip: Stay informed about broadband initiatives in your area by visiting the websites of your state’s broadband office and the Federal Communications Commission (FCC).

What are your thoughts on the changes to KentuckyWired? Share your opinions in the comments below!

March 11, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Employee Took A Support Call From A Customer Complaining About Dead Router, But He Was Shocked To Hear What She Thought “The Internet” Was » TwistedSifter

by Chief Editor March 9, 2026
written by Chief Editor

The Surprisingly Common Tech Knowledge Gap: When the Internet Seems…Liquid

A recent story circulating online highlights a fascinating, and sometimes humorous, gap in public understanding of technology. A customer service representative shared a tale of a customer who genuinely believed the internet was a physical substance – a liquid contained within her router that could “spill” during a power outage. While this anecdote is amusing, it points to a broader issue: a significant portion of the population lacks a fundamental understanding of how the internet and related technologies actually work.

Beyond the “Spilled Internet”: Common Misconceptions

This isn’t an isolated incident. Support staff across various tech industries regularly encounter similar misconceptions. People often struggle to differentiate between the internet service itself, the modem that brings it into the home, and the router that distributes it. The idea that the internet is a tangible thing, like water or electricity, is surprisingly prevalent. This lack of understanding can lead to frustration during troubleshooting, unnecessary service calls, and even security vulnerabilities.

Why Does This Knowledge Gap Exist?

Several factors contribute to this phenomenon. Technology evolves at a rapid pace, leaving many people behind. The complexity of networking infrastructure is often hidden behind user-friendly interfaces, creating a “black box” effect. Digital literacy isn’t universally taught, and access to reliable information can be unevenly distributed. As the web search results indicate, even basic troubleshooting steps, like unplugging and replugging devices after a power outage, aren’t always intuitive for everyone.

The Impact of Power Outages on Internet Access

The original story was triggered by a power outage. It’s crucial to understand what actually happens when the lights go out. As explained in the search results, the internet service itself usually remains active, maintained by your Internet Service Provider (ISP) with backup power systems. The problem lies with the equipment in your home – the modem and router – which require electricity to function.

Solutions range from simple to sophisticated. A mini-UPS (Uninterruptible Power Supply) can provide short-term backup power, keeping your network running for a few hours. For longer outages, a portable power station offers a more robust solution, capable of powering multiple devices simultaneously.

Future Trends: Bridging the Digital Divide

Addressing this knowledge gap is becoming increasingly important as our lives become more reliant on technology. Several trends are emerging that could support bridge the digital divide:

  • Simplified Explanations: Tech companies are beginning to focus on explaining complex concepts in plain language, avoiding jargon and technical terms.
  • Increased Digital Literacy Programs: Community organizations and educational institutions are offering more digital literacy training programs, targeting diverse populations.
  • Proactive Support: ISPs are investing in proactive support measures, such as automated troubleshooting tools and educational resources, to help customers resolve issues independently.
  • More Intuitive Interfaces: User interface (UI) and user experience (UX) design are prioritizing simplicity and clarity, making technology more accessible to everyone.

The Rise of the “Smart Home” and the Need for Understanding

As more devices become connected to the internet – from smart thermostats to security cameras – a basic understanding of networking principles will become even more essential. The more reliant we become on interconnected devices, the more critical It’s that users understand how these systems work and how to troubleshoot common problems.

Did you know? A power surge, often accompanying a power outage, can potentially damage routers and modems, even if the outage itself doesn’t. Protecting your equipment with surge protectors is a smart investment.

FAQ: Internet & Power Outages

  • What happens to my internet during a power outage? Your modem and router lose power, disconnecting you from the internet, even though the internet service itself may still be active.
  • Can I preserve my internet running during a power outage? Yes, with a battery backup solution like a mini-UPS or a portable power station.
  • Is a power outage bad for my router? A power outage itself isn’t usually harmful, but voltage spikes that occur during or immediately after an outage can damage your equipment.
  • What is a modem? A modem receives the internet signal from your ISP.
  • What is a router? A router distributes the internet signal to your devices, creating your home network.

Pro Tip: Before a storm or planned power outage, write down the wattage requirements of your modem and router. This will help you choose the right size battery backup.

What’s the most surprising tech question you’ve ever encountered? Share your stories in the comments below!

Explore more articles on digital literacy and home networking.

March 9, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Amazon says outage was triggered by ‘software code deployment’

by Chief Editor March 6, 2026
written by Chief Editor

Amazon Outages: A Sign of Growing Pains in a Complex Digital Ecosystem?

Amazon’s recent website and app outage on Thursday, impacting users’ ability to check out, access account information, and view prices, highlights a growing concern: the increasing fragility of the digital infrastructure supporting modern commerce. The incident, which peaked with over 22,000 reported issues according to Downdetector, was attributed to a “software code deployment,” but the broader implications point to potential future trends.

The Rise of Interconnected Vulnerabilities

The Amazon outage wasn’t an isolated event. It followed disruptions to Amazon Web Services (AWS), the company’s cloud computing unit, stemming from drone strikes that damaged data centers in the United Arab Emirates and Bahrain. These incidents, linked to potential geopolitical motivations – Iranian state media reported the Bahrain data center was targeted by Iran’s Islamic Revolutionary Guard Corps – demonstrate a recent layer of vulnerability. The interconnectedness of services means a disruption in one area can quickly cascade into others.

This trend suggests a future where outages aren’t simply technical glitches, but potential consequences of broader geopolitical instability or targeted cyberattacks. Businesses relying heavily on cloud infrastructure, like Amazon, will need to invest heavily in redundancy, security, and disaster recovery planning.

Software Deployment: The Double-Edged Sword

Amazon’s explanation – a faulty software code deployment – is a common cause of outages. The pressure to rapidly innovate and release new features often leads to faster deployment cycles. While agility is crucial, it increases the risk of introducing bugs or conflicts that can bring down systems.

Expect to see a greater emphasis on “canary releases” and more robust testing procedures. Canary releases involve rolling out updates to a small subset of users before a full deployment, allowing for early detection of issues. Automated testing and AI-powered anomaly detection will also become increasingly important in identifying potential problems before they impact a large user base.

The Impact on Consumer Trust and Brand Loyalty

Each outage erodes consumer trust. While Amazon was able to resolve the issues within approximately six hours, the disruption inconvenienced countless shoppers and raised questions about the reliability of the platform. Repeated outages could drive customers to explore alternative retailers.

Companies will need to prioritize transparency and proactive communication during outages. Providing real-time updates, explaining the cause of the problem, and offering compensation for inconvenience can facilitate mitigate the damage to brand reputation.

The Future of Cloud Resilience

The AWS disruptions highlight the need for greater resilience in cloud infrastructure. Geographically diverse data centers are essential, but they are not enough. Companies are exploring multi-cloud strategies, distributing their workloads across multiple cloud providers to reduce their reliance on any single vendor.

edge computing – processing data closer to the source – can reduce latency and improve resilience by minimizing the impact of outages in centralized data centers.

FAQ

What caused the Amazon outage on Thursday?

Amazon stated the outage was due to a software code deployment.

Were Amazon’s cloud services affected?

Amazon said its cloud services were functioning normally following previous disruptions caused by drone strikes.

How long did the outage last?

The issues appeared to be largely resolved by 8 p.m. ET.

Is Amazon a target for geopolitical attacks?

Iranian state media reported that Amazon’s data center in Bahrain was targeted by Iran’s Islamic Revolutionary Guard Corps.

Pro Tip: Diversify your online shopping across multiple platforms to minimize disruption from any single retailer’s outages.

What are your thoughts on the increasing frequency of online outages? Share your experiences and concerns in the comments below. Explore our other articles on digital security and e-commerce trends to stay informed. Subscribe to our newsletter for the latest insights delivered directly to your inbox!

March 6, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Iran’s Tiered Internet: Shutdowns, Control & Digital Apartheid

by Chief Editor February 27, 2026
written by Chief Editor

The Fractured Future of the Internet: Iran’s Two-Tiered System and the Rise of Digital Control

Iran’s recent escalation in internet control, moving beyond simple censorship to a two-tiered system known as Internet-e-Tabaqati, isn’t an isolated incident. It’s a bellwether for a growing trend: the deliberate fracturing of the global internet and the weaponization of connectivity. This shift has profound implications for human rights, political stability, and the future of free expression worldwide.

From Blackouts to Tiered Access: A Strategic Evolution

Historically, Iran has employed internet shutdowns during periods of unrest. However, the 2026 blackout differed significantly. Unlike previous disruptions that allowed the domestic intranet (NIN) to function, this shutdown crippled local infrastructure, including mobile networks and even landlines. This brute-force approach signaled a strategic shift. The regime isn’t just aiming to control information flow out of the country. it’s focused on preventing coordination within Iran.

This escalation builds upon a long-term strategy formalized in 2009 with the groundwork for a tiered internet. The July 2025 regulation officially institutionalized this hierarchy, granting access to the global internet as a “privilege” based on loyalty and professional necessity. The introduction of “white SIM cards” – special mobile lines for government officials and approved journalists bypassing state filtering – exemplifies this division. While ordinary citizens navigate VPNs and blocked ports, the elite enjoy unrestricted access.

The Exportability of Digital Repression

Iran’s approach to internet control is distinct from China’s “Great Firewall.” China built its digital ecosystem from the ground up, creating domestic alternatives. Iran, however, is retrofitting controls onto existing global infrastructure. This “overlay model” is particularly concerning due to the fact that it’s highly exportable. It demonstrates to other authoritarian regimes that they can achieve significant control without building entirely new systems.

Evidence suggests this “authoritarian learning” is already occurring. The recent, more sophisticated internet shutdown in Afghanistan is a case in point. If Iran succeeds in normalizing tiered internet access, similar policies are likely to proliferate globally.

Beyond Censorship: Social Control Through Isolation

The technical architecture behind Iran’s shutdown reveals its core purpose: social control through isolation. Simple censorship – blocking URLs – is no longer sufficient against a tech-savvy population. The regime has focused on building a “sovereign” network structure allowing for granular control. By disabling local communication channels, the state aims to disrupt the “swarm” dynamics of protests, breaking their psychological momentum. Even blocking chat functions in non-political apps demonstrates the regime’s paranoia about any platform enabling communication.

The internet, is not merely a tool for information access but an independent witness to history. Severing connectivity creates a zone of impunity where abuses can occur without immediate scrutiny.

The Rise of Direct-to-Cell Technology and Humanitarian Access

Recognizing the threat, civil society organizations are advocating for alternative connectivity solutions. A key focus is “direct-to-cell” (D2C) satellite connectivity. Unlike traditional satellite internet requiring bulky equipment, D2C connects directly to standard smartphones, making it more resilient to infrastructure shutdowns.

Advocates are calling for regulators to require satellite providers to include humanitarian access protocols in their licensing, ensuring services can be activated in crisis zones. Expanding general licenses to explicitly cover satellite connectivity and directing funding toward technologies harder to block – such as mesh networks and D2C solutions – are also crucial steps.

The Need for a Resolute Architecture

Deliberate internet shutdowns are increasingly commonplace worldwide. Iran’s actions offer a glimpse into a fractured internet future. Building resolute architectures – technologies and policies that safeguard connectivity – doesn’t solve the problem entirely, but it provides individuals in repressive countries with a fighting chance.

FAQ: Iran’s Internet Control and Global Implications

Q: What is Internet-e-Tabaqati?
A: It’s Iran’s two-tiered internet system, granting privileged access to the global internet based on loyalty and professional necessity.

Q: What are “white SIM cards”?
A: Special mobile lines issued to government officials and approved journalists that bypass state filtering, providing unrestricted internet access.

Q: How is Iran’s approach different from China’s internet control?
A: China built its digital ecosystem from scratch, while Iran is retrofitting controls onto existing global infrastructure, making its model more easily exportable.

Q: What is direct-to-cell (D2C) technology?
A: A satellite connectivity solution that connects directly to standard smartphones, offering resilience against infrastructure shutdowns.

Did you know? The blocking of chat functions in non-political apps in Iran highlights the regime’s broad fear of any platform facilitating communication between individuals.

Explore more articles on digital rights and internet freedom here. Share your thoughts on the future of internet access in the comments below.

February 27, 2026 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Google Gemini Intelligence: Strict Hardware Requirements Limit Device Compatibility

    May 16, 2026
  • Study Finds 4% of City Air Pollution Is Microplastics

    May 16, 2026
  • The World’s Best Beaches 2026: 5 Must-Visit Paradise Destinations

    May 16, 2026
  • Alex Saab to be Deported to the United States from Venezuela

    May 16, 2026
  • Debrecen VSC Secures European Spot With 2-1 Victory Over Újpest FC

    May 16, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World