Monday, March 23, 2026


DIGITAL LIFE


Your smart home can be easily hacked. New safety standards will help, but stay vigilant

On a quiet suburban street, a modern Australian home wakes before its owners do. The lights turn on automatically, the thermostat adjusts to a comfortable temperature, and the coffee machine begins brewing. A doorbell camera watches the front yard, a baby monitor streams live footage to a parent's phone, and a smart speaker waits for its next command.

This is the promise of the smart home: convenience, efficiency, and peace of mind.

But behind this smooth experience is a hidden risk: every connected device can also be a way for cyber attackers to get in.

The Australian government has responded by introducing minimum security standards for smart devices to better protect households in this increasingly connected world.

These standards recently took effect. So what's in them? And are they sufficient to keep people safe?

Starting with manufacturers...From my experience working in cybersecurity, I've seen that security risks start from manufacturers themselves.

Many smart devices are not designed with security as a priority. Manufacturers often focus on keeping costs low, releasing products quickly, and making them easy to use. Security is treated as an afterthought.

For example, many devices arrive with weak default passwords such as "admin" or "1234," which users rarely change. This creates an easy opportunity for attackers to gain access.

The Mirai botnet attack in 2016 clearly demonstrated the risks. In this case, hundreds of thousands of insecure devices such as doorbell cameras were hijacked to launch massive "distributed denial-of-service" (DDoS) attacks. This is a type of cyber attack where many computers or devices are used together to overwhelm a website, server, or network with traffic, so it becomes slow or completely unavailable to legitimate users.

More recent research has shown smart home devices can be exploited not only to disrupt systems but also to spy on households. In some cases, strangers have accessed baby monitors, and poorly secured cameras have exposed private footage online.

Another major issue is the lack of regular software updates.

Many low-cost or older devices don't receive ongoing security patches, which means known software vulnerabilities remain open indefinitely. Attackers actively scan the internet for such devices, exploiting weaknesses at a large scale. Cloud-connected and AI-enabled systems amplify risks.

The consequences of these weaknesses go beyond individual households. Compromised devices can be used as part of larger cyber attacks, forming botnets that target critical infrastructure or businesses.

In effect, an insecure smart lightbulb or camera can become a building block in global cyber crime operations.

What are the new standards? In response to these growing threats, the Australian government has begun introducing mandatory minimum security standards for connected devices.

These standards took effect earlier this month. They aim to establish a baseline level of protection across all products entering the market.

While the details of these standards may evolve, the key ideas are clear.

First, devices must not use universal default passwords. Each device should either require users to create a unique password during setup or be shipped with a unique credential.

Second, manufacturers must provide a clear vulnerability disclosure policy, allowing security researchers to report issues responsibly.

Third, there must be transparency around how long a device will receive security updates, so consumers can make informed decisions.

These changes shift some responsibility from users to manufacturers. Instead of expecting consumers to fix security problems themselves, devices must be designed to be safer from the start.

In practice, this means fewer vulnerabilities and greater accountability across the industry.

Regulation alone isn't enough...However, regulation alone is not enough. Household behavior still plays a critical role in maintaining security. Fortunately, some of the most effective steps are simple.

Changing default passwords to strong, unique ones is one of the most important steps. A strong password should be long, complex, and not reused across multiple devices or accounts.

Enabling multi-factor authentication wherever possible adds a second layer of defense, making it significantly harder for attackers to gain access.

Regularly updating device firmware, also known as "software for hardware," is equally important. Firmware updates often include patches for newly discovered vulnerabilities, and delaying them leaves devices exposed.

Users should also consider their home network design. Placing smart devices on a separate network, such as a guest wifi, can help isolate them from more sensitive information on personal or work devices.

Finally, choosing reputable manufacturers matters. Companies with a strong track record of providing ongoing security updates and transparent policies are generally safer choices than unknown or low-cost alternatives.

Smart homes are becoming an integral part of everyday life, and their benefits continue to grow. But as intelligence and automation expand, convenience must not come at the expense of security and trust.

With stronger standards, better-designed devices, and more informed users, it is possible to enjoy the benefits of smart homes without exposing ourselves to unnecessary cyber risks.

mundophone


DIGITAL LIFE


Researchers achieve 100-meter underground wireless communication

Korean researchers have confirmed that underground wireless communication is possible, moving beyond the terrestrial wireless communication they have primarily focused on until now. This opened up a new wireless channel for confirming the survival of buried people in the event of a collapse of an underground facility such as a mine, conducting underground rescue operations, or conducting underground military operations.

ETRI has succeeded in developing the world's first "magnetic field underground communication source technology" that can transmit and receive voice signals 100 meters underground in a mine using a 1-meter diameter transmitting antenna and a several-centimeter-class receiving antenna.

This technology confirms the feasibility of voice transmission and reception in underground spaces previously inaccessible by wireless technology. Accordingly, this technology is expected to be applied in activities such as rescue operations, military operations, and common utility tunnel safety management.

In particular, this research is based on test results conducted in a limestone bedrock environment where underground communication is known to be virtually impossible, and is considered to have opened up a new area of underground space communication technology, such as rescue operations and military operations.

Underground mines have very severe signal attenuation, making them inaccessible using existing wireless communication technologies.

ETRI focused on the stable transmission of magnetic fields in underground media and developed a low-frequency magnetic field-based communication system.

The researchers implemented communication using a 1-meter-diameter transmitting antenna, a small magnetic field receiving sensor of several centimeters in size, a frequency of approximately 15 kHz, and a data rate of 2–4 kbps, which is sufficient for voice communication.

They successfully conducted bidirectional communication testing within a 100-meter straight-line distance between the mine entrance (ground level) and the fifth underground layer. This is the world's first demonstration that surpasses existing tens-of-meters-level overseas research.

This outcome signifies the possibility of communication between buried people and rescue teams in situations such as underground disasters, including mine collapses.

Also, it can be widely utilized in various fields, such as responding to disasters in common utility tunnels, gas pipelines, and oil pipelines, ensuring communication continuity during military operations in underground bunker environments, and more.

ETRI explained that it is advancing technologies linked to personal devices such as smartphones, and that this will make wireless relays (APs) connecting ground and underground possible.

This technology has been described in the IEEE IoT Journal, and domestic and international patent applications have been completed for key elements such as the transmitter/receiver, antenna, low-frequency modem, and bandwidth expansion technology.

Twelve SCI papers in publication, two presentations at international academic conferences, eight international patents, and technology transfers were accomplished.

Cho In Kui, Principal Researcher of ETRI's EM Wave Basic Technology Research Section, stated, "This is a technology that can significantly reduce the possibility of communication disruption during rescue operations in the event of a mine accident, as much as it has succeeded in communication in underground environments where radio waves do not reach."

Seung Keun Park, Assistant Vice President of ETRI's Radio Research Division, said, "This is an innovative technology necessary not only for mines but also for extreme environments such as tunnels, underground facilities, offshore drilling, and national defense. It will be utilized in various industrial sectors as a highly reliable communication means."

Achieving wireless communication at a depth of 100 meters, typically utilizing low-frequency magnetic induction (MI) or Through-the-Earth (TTE) technology, offers significant advantages in safety, operational efficiency, and environmental monitoring where wired, or high-frequency systems, fail.

Key advantages include(below):

Enhanced mine safety and rescue: The primary advantage is reliable, post-accident communication. Unlike wired systems that break, TTE systems can transmit through hundreds of meters of rock, allowing trapped miners to communicate their location and condition to the surface, and assisting in emergency evacuations.

Deep-earth operation visibility: It enables real-time monitoring of geotechnical data, such as rock stress, gas concentration, and humidity at extreme depths, helping to prevent disasters.

Operational continuity in mining: Deep, wireless nodes can be used to track personnel and manage autonomous machinery at the working face of deep mines, increasing production efficiency without the need for constant maintenance of extensive cabling.

Environmental monitoring (landslides/water): Deep underground sensors can measure pore pressure, moisture levels, and water levels inside dams, providing critical early warning data.

Minimal environmental impact: Because the infrastructure is concealed, it avoids interference with surface operations, such as agricultural tiling or topsoil activity.

High reliability in harsh conditions: Underground communication channels, particularly those using magnetic induction, are less affected by complex tunnel structures or mining-related rubble compared to high-frequency RF systems.

Researchers (such as those at ETRI) are actively developing technologies, including micro-magnetic field communication, to make reliable communication at depths exceeding 100 meters a standard for safety in mines and tunnels

Provided by National Research Council of Science and Technology

Sunday, March 22, 2026


TESLA


Tesla Model Y is the world's best-selling car for the 3rd year

Tesla's electric SUV continues to dominate the global market, surpassing all combustion engine competition, despite new challenges in China and Europe.

The global automotive landscape is experiencing a historic moment that confirms the paradigm shift in mobility. For the third consecutive year, the Tesla Model Y has become the best-selling passenger car on the planet. This feat, shared by Elon Musk's brand based on data from consultancies such as JATO Dynamics and Statista, marks the first time a purely electric vehicle has managed to maintain this throne for such a prolonged period, leaving behind iconic combustion engine models and hybrid offerings from traditional brands.

Over three years of uninterrupted leadership, the Model Y has already put more than four million units on the roads. In the last year of 2025 alone, Tesla managed to produce approximately 1.65 million vehicles, having delivered 1.63 million to its customers worldwide. If you look closely at these numbers, you realize the gigantic scale of the American brand's operation, which seems to have found in the Model Y the perfect formula between space, technology, and performance.

One cannot talk about Tesla's global success without mentioning the Shanghai Gigafactory. This production unit has become the true beating heart of the company. In 2025, it was responsible for delivering 851,732 vehicles, which is equivalent to more than half (52%) of all Tesla's worldwide sales. It is from here that not only the cars for the gigantic Chinese market come, but also many of the units that reach other continents.

After a few months of uncertainty and sales declines, Tesla seems to be regaining momentum in China. In February, data shows an annual growth of more than 42% in retail sales, allowing the brand to recover a market share of almost 14% in the electric vehicle segment. If you're looking for the culprit behind this oxygen balloon, you'll find the Model Y again, whose sales skyrocketed impressively that month compared to the same period last year.

The pressure from the competition and the Xiaomi phenomenon...However, not all the news is perfect for Tesla. The Chinese market is more competitive than ever, and the pressure from local manufacturers is constant. BYD remains a persistent shadow, but the big surprise came from the technology sector. The Xiaomi YU7 managed to steal the title of best-selling electric car in China in recent periods, proving that Tesla's dominance is no longer unquestionable.

If we analyze the total balance for 2025 in China, the Model Y suffered a 34.44% drop in retail sales compared to the previous year. Despite this sharp decline, the model remains the pillar that sustains Tesla's operation in Chinese territory, representing almost 68% of the brand's total sales volume in that country.

mundophone


DIGITAL LIFE


AI applications and the hidden danger of smartphone permissions

Every time you install a new application, your smartphone presents a series of access requests that most users accept without reading. ESET, Europe's largest cybersecurity company, issued a warning on March 19, 2026, about the real and growing risks associated with this practice, with particular emphasis on AI apps (Artificial Intelligence applications). The habit of clicking "allow" without evaluating the implications can expose banking credentials, real-time location, and screen content to third parties without the user's knowledge.

Whenever a new application is installed or a feature is activated, the operating system presents a permission request. This mechanism acts as an "invisible sentinel" that regulates access to device data and resources — but its effectiveness depends entirely on the user's attention. While some permissions are essential for the functioning of applications, others are excessive or serve purposes that have nothing to do with the stated usefulness of the tool. One of the most sophisticated attack vectors exploited by malicious applications is the use of overlay permissions to execute clickjacking techniques. In this scenario, the user believes they are interacting with legitimate interface buttons, but in reality, they are clicking on invisible elements that authorize actions in the background. This tactic subverts the operating system's security mechanisms and facilitates the installation of malware without raising immediate suspicion.

AI applications as a new risk vector...The proliferation of Artificial Intelligence-based applications has introduced a new layer of risk to digital privacy. Many of these tools request permanent access to the microphone, contact list, and even the content visible on the device's screen. This continuous collection allows for the creation of detailed business profiles and exposes confidential information in case of interception or data leakage.

Health and fitness applications represent a similar risk, collecting biometric data with potential real-world impacts, such as sharing with insurance companies or third-party entities. In both cases, the user grants permissions voluntarily, convinced that they are interacting with a trustworthy application. Accessibility as an attack vector...Originally designed to support users with motor or visual limitations, accessibility services offer almost total control over the smartphone. When this permission is granted to an untrusted application, attackers can intercept SMS authentication codes and monitor all interactions performed on the device. This is often the central mechanism used by spyware and ransomware to steal banking credentials and demand financial ransoms.

Managing app permissions safely...Before allowing or blocking, always consider if a permission is necessary for the app in question to do its job.Another good rule of thumb is to only “allow once” or “while using.” Only safety apps like “Find My” should really have access 24/7/365.

You should be asked to review your permissions regularly with many apps. But it may be a good idea to proactively audit permissions. Here’s how:

iOS...Go to Settings > Privacy & Security.

Scroll to the bottom and tap (or turn on) App Privacy Report.

This shows you which apps accessed your data and when.

Alternatively:

Go to Settings > Apps.

Select a specific app (e.g., Instagram).

You will see a list of all toggles (Camera, Mic, Contacts). Turn off anything that isn't essential.

Android...Go to Settings > Security & Privacy > Privacy > Privacy Dashboard.

Tap on 7-Day View (top right menu) to see a timeline of every app that used your sensors over the last week. (These steps may not be the same across all Android-powered devices, so do check.)

If you see an app using the microphone at 3:00 AM, tap it to revoke access immediately.

Alternatively (navigation paths still vary across Android skins):

Go to Settings > Apps > [App Name].

Ensure "Manage app if unused" (or "Pause app activity if unused") is toggled ON.

If you don't use the app for a few months, Android will automatically strip its permissions, delete temporary files, and stop notifications.

Above all, only ever download apps from legitimate stores (Google Play/App Store). Read their reviews first before deciding whether to do so. Consider installing a mobile security solution from a reputable security provider.

Permission risk levels...The assessment of the danger associated with each permission depends on the application's context and its potential for abuse:

Permission--Risk level--Security impact(below):

-Screen overlay--Critical--Allows clickjacking and interaction with invisible elements

-Accessibility services--Critical--Grants total control and interception of SMS authentication

-Microphone and camera--High--Enables active listening and remote activation

-Background location--Medium/High--Allows continuous physical tracking and routine profiling

-SMS and call logs--High--Exposes security codes and two-factor authentication

Risk mitigation strategies...The most effective defense requires regular auditing of granted access through the privacy settings available on both Android and iOS. Ricardo Neves, Head of Marketing and Communication at ESET Portugal, recommends applying the principle of least privilege: “before accepting any permission, users should question whether this authorization is truly necessary for the application to function.”

Fundamental best practices include (below):

-Downloading apps only from official stores

-Reading reviews and comments from other users before installation

-Revoking unnecessary permissions after installation

-Selecting “allow only during use” or “only once” whenever possible

-Regularly updating the operating system and installed applications

-Using antimalware solutions from recognized vendors

Key highlights(below):

-AI applications are increasingly requesting permanent access to the microphone, contacts, and screen content.

-Overlay permissions allow clickjacking — the user clicks on invisible elements without knowing.

-Accessibility services, when granted to malicious apps, allow total control of the device.

-Background location allows continuous physical tracking without active user interaction.

-Regular review of permissions on iOS and Android is the main line of individual defense.

mundophone

Saturday, March 21, 2026


TECH


Student proposes replica of the Twin Towers in Chicago as a technology center

An aspiring architect has launched an ambitious bid to build a replica of the destroyed Twin Towers as part of a science hub in Chicago. 

British aerospace engineering student Raphael Chryslar has proposed constructing two skyscrapers as part of a district he calls the World Technology Center, which would share its initials with the original site. 

He has pitched the project as a Science, Engineering, Technology and Mathematics (STEM) hub for the Windy City.

Chryslar, who lives in England, created renderings of the center that show the two iconic towers resurrected in Chicago's South Loop, although with wider windows covered with bright blue glass.

The towers are designed to stand 110 stories tall, rising 1,500 feet into the sky. The complex would comprise eight buildings across a 35-acre site. 

'The Twin Towers are designed to the latest in modern safety standards that improve massively from the legacy,' the World Technology Center website stated.

'Our vision reincarnates that American symbol of peace and strength that was wrongfully taken from us nearly 25 years ago, and with it thousands of innocent lives.' 

The original Twin Towers were built between 1966 and 1971. They were struck by two airliners on September 11, 2001, and subsequently collapsed during the deadliest terrorist attack in US history.

Nearly 3,000 people were killed when Islamic terrorists hijacked four planes, crashing two into the Twin Towers and one into the Pentagon. The fourth plane was heroically diverted by the passengers and crashed in a Pennsylvania field. 

New York's World Trade Center has since been largely rebuilt to a dramatically different design, with One World Trade Center now standing as the 'Freedom Tower' on its own.

Many New Yorkers, including Donald Trump himself, say they miss the original Twin Towers and lament their disappearance from the New York skyline. 

According to a January 1 update on the World Technology Center's Facebook page, Chryslar visited Chicago in December to pitch his idea to local politicians. 

'We have secured direct contacts, and they have requested our team to keep in touch internally as the project evolves,' the update said.

Chryslar says the new towers are equipped with enhanced safety technology, including anti-aircraft defenses, in a bid to prevent a repeat of 9/11.

Construction on the World Technology Center is slated to begin in 2030, with a target launch date of 2050, according to its website.  

While there do not appear to be any official plans or permits for the center from Chicago officials, discussions about rebuilding the Twin Towers have persisted for decades. 

On social media, people are widely divided on the topic, with many outraged by the World Technology Center proposal in particular.

'Feel like recreating the twin towers in Chicago is both lazy and in poor taste,' one person wrote on Reddit.

'Just because a bunch of people sign a petition asking for the Twin Towers back doesn’t mean they’re coming back,' added another.

'This isn’t [video game] SimCity, you can’t just plop this in any random city just because a bunch of randos think it would be cool.'

But others were excited to see a copy of the world's most iconic skyscraper rising again on American soil.

There is some support for building the World Technology Center, and the project's website cites 9,184 individuals' statements and signatures from the Twin Towers Alliance expressing support for rebuilding the towers.

'I hope this happens. I can't think of anything more satisfying than seeing the Towers once again stand,' one person wrote on Reddit. 

'This is actually quite a robust concept, unlike a few pre-9/11 WTC rebuild ideas. I've had a look [at] the proposal's website and the plans are very well thought out,' wrote a second person.

On Facebook, one person wrote, 'Honoring the memory of 9/11, and I'm hopeful that the World Technology Center in Chicago will rise as a symbol of resilience by the next decade, paying tribute to the iconic towers that once stood tall in New York.' 

The Daily Mail has contacted the World Technology Center, the Chicago mayor's office, the Twin Towers Alliance and the 9/11 Memorial for comment.

The project's author, Raphael Chryslar, released images showing two 110-story towers, approximately 457 meters tall, similar to the originals but with adaptations such as blue glass facades and enlarged windows. The complex would occupy an area of ​​14 hectares in the South Loop neighborhood and would include a total of eight buildings.

The project rekindles memory and controversy...According to information published on the project's website, the new towers would be built with updated security technologies, including defense systems to prevent attacks similar to those that destroyed the World Trade Center in New York. Chryslar claims the proposal seeks to “reincarnate a symbol of peace and strength” lost almost 25 years ago.

The original towers, built between 1966 and 1971, were struck by hijacked planes during the 2001 attacks, which left nearly 3,000 dead. Since then, the New York complex has been rebuilt with a new design, whose main building is One World Trade Center.

Despite the publicity, there is, to date, no official authorization for construction in Chicago. In a recent social media post, Chryslar stated that he presented the proposal to local authorities, who reportedly requested monitoring of the next steps without formally supporting it.

The initiative, however, is dividing opinions. While some criticize the idea, considering it inappropriate or disrespectful, others see the proposal as a form of tribute and resilience. The project's website claims to have gathered thousands of expressions of support, although the plan still lacks institutional backing.

The project's creator predicts construction will begin in 2030, with a possible inauguration in 2050, should the project progress through the political and urban planning stages.

mundophone

 

DIGITAL LIFE


Alert: DarkSword spyware for iPhone linked to Russia

The DarkSword spyware for iPhone has been identified by the Google Threat Intelligence Group (GTIG), Lookout, and iVerify as part of a cyber espionage arsenal allegedly operated by groups linked to the Russian government. The attacks primarily targeted Ukrainian targets, but intrusion logs also point to Saudi Arabia, Turkey, and Malaysia. Apple has issued an official alert and recommends the immediate update of all devices.

The GTIG (Google Threat Intelligence Group), in conjunction with Lookout and iVerify, published this week a detailed analysis of two exploit kits: DarkSword and Coruna. The first targets iPhones with iOS versions 18.4 to 18.6.2 and can extract passwords, photos, cryptocurrency wallet credentials, WhatsApp and Telegram messages, browsing history, and call logs, erasing its traces after the intrusion. The second is a package of 23 components, identified in early March 2026.

The persistent threat group UNC6353 is using both tools in watering hole attacks (a technique that involves compromising legitimate websites frequented by targets, such as news portals and government platforms). iVerify estimates that up to 270 million users may be exposed. Lookout adds that about 15% of all iOS devices in use continue to run vulnerable versions of the operating system.

According to TechCrunch, which reported the results of the forensic analysis conducted by the investigators, the Coruna toolkit was originally developed by the US company L3Harris, a US defense contractor. L3Harris has not publicly confirmed this attribution. The tool is believed to have reached the hands of Russian operatives and Chinese cybercriminals through a path that investigators have not yet been able to fully reconstruct.

Rocky Cole, co-founder of iVerify, told TechCrunch: “All indications point to the Russian government.” Investigator Justin Albrecht, from Lookout, describes UNC6353 as “a well-funded threat actor, conducting attacks for financial gain and espionage in alignment with the requirements of Russian intelligence services.” Both claims are based on behavioral and infrastructure analysis, with no official confirmation from any government.

One noteworthy detail is the use of large-scale language models in the customization of both toolkits. The DarkSword server component contained AI-generated code with detailed technical comments, a serious operational security flaw for an agent linked to a state. Some experts warn, however, of the possibility that this is a deliberate false flag technique, intended to make it difficult to attribute to a specific actor.

How to protect yourself:

-Update iOS Settings > General > Software Update

-Restart your device A simple restart eliminates malware residing in volatile memory

-Enable isolation mode settings > privacy & security > isolation mode

-Avoid unverified websites do not click on links from unknown sources

Apple stated that it is “aware of a report indicating that this issue may have been exploited in a highly sophisticated attack against specific individuals in iOS versions prior to iOS 26.” All vulnerabilities were fixed with the release of iOS 26.3 in February 2026; the iOS 26.3.1 version, released in March, introduced additional fixes. Google reported the flaws to Apple at the end of 2025.

For high-risk users (journalists, activists, government officials), Lockdown Mode remains the most robust protection available on iOS. The feature disables features such as connection previews and the installation of configuration profiles, so its use should be considered on a case-by-case basis.

This case exposes a structural flaw in the cybersecurity tools market: the absence of effective post-sale control mechanisms. A tool developed by a private American contractor reached agents of adversarial states without any containment mechanism working. The debate on the regulation of the cyberweapons market (already underway after the Pegasus case) takes on new dimensions with the evidence of the use of artificial intelligence to lower the technical barrier to entry in this type of operation.

The DarkSword spyware for iPhone targeted devices running iOS 18.4 to 18.6.2, capable of extracting sensitive data without leaving a trace.

The UNC6353 group, with alleged links to the Russian government, used watering hole attacks against Ukrainian targets, among other countries.

The Coruna toolkit was allegedly developed by the American defense contractor L3Harris, according to forensic code analysis (attribution not confirmed by the company).

Up to 270 million iPhone users may be exposed, with 15% of iOS devices still running vulnerable versions.

All flaws are fixed in iOS 26.3 and later versions.

mundophone

Friday, March 20, 2026


TECH


Expanding computing resources with light for AI datacenters

A team of Korean researchers has developed the world's first technology that can freely connect and disconnect core computing resources such as memory and accelerators with "light" in next-generation artificial intelligence (AI) datacenters. Electronics and Telecommunications Research Institute (ETRI) announced the development of a new optical switch based datacenter resource interconnection technology (Optical Disaggregation, OD).

This technology is regarded as a core next-generation optical network technology that is designed to resolve the shortage of computing resources due to the increasing AI services and that enables faster and more efficient operation of future datacenters.

Current datacenters are designed based on a server-centric architecture in which CPUs, memory, storage, and accelerators (GPUs) are bundled within a single server.

In this architecture, only the limited resources installed on the same server can be utilized, leading to problems in which overall efficiency drops due to large deviations in resource utilization, such as some servers using only memory excessively while others use only the CPU.

In addition, most datacenters use electrical packet-based switches, which causes delays as multiple optical-electrical-optical conversions occur during the data switching process. These delays limit the performance of delay-sensitive operations such as connecting remote memory resources and large-scale AI training.

The Optical Disaggregation (OD) technology developed by ETRI fundamentally solved these structural limitations. When memory or accelerators within a server are insufficient, an optical switch can be used to instantly connect remote resources to the server via an optical switch.

This enables resources to be connected and disconnected rapidly and flexibly, exactly when needed and at the exact amount required, even for tasks demanding high-performance computing such as AI training or large-scale data analysis.

In particular, this technology is significant in terms of global technological competitiveness as it is the world's first case of connecting the Compute Express Link (CXL) standard with an optical switch.

Computing Resources with Light. Credit: Electronics and Telecommunications Research Institute(ETRI)

The research team successfully demonstrated the technology by building a verification system combining ETRI's in-house developed CPU adapter, memory blade, accelerator blade, and OD manager.

The experiment confirmed that when a service program requests additional resources, the optical path is automatically set to allocate the necessary memory and accelerators in real time, and the service is steadily provided. In other words, they demonstrated for the first time in the world a system that can provide light speed connection between datacenter resources using software control.

ETRI secured original patents related to CXL applied to this technology and filed 47 domestic and international patents for related technologies. In addition, the research results were presented at the Optical Fiber Communications Conference and Exposition (OFC) and the European Conference on Optical Communication (ECOC), the most prestigious conferences in the field of optical communication, gaining recognition for its technological prowess in the international academic community.

Furthermore, this research officially proved its excellence by being included in the "Top 100 Excellent National R&D Performances" selected by the Ministry of Science and ICT in 2023.

Lee Jun Ki, Director of Optical Network Research Section at ETRI, said, "Datacenter resources are being consumed rapidly worldwide due to the increase of AI services. This research achievement will serve as an important opportunity to resolve the datacenter resource shortage problem by efficiently sharing and utilizing memory and accelerators, and to accelerate the transition to sustainable future datacenters."

ETRI plans to apply this technology across a range of fields, including the advancement of national AI infrastructure, integration of cloud and supercomputing, and the development of eco-friendly datacenters for driving innovation across industries.

Provided by National Research Council of Science and Technology

DIGITAL LIFE Your smart home can be easily hacked. New safety standards will help, but stay vigilant On a quiet suburban street, a modern A...