How a small German state's bid to replace Microsoft with open-source alternatives like Linux and Kamailio faces issues, as the EU pushes "digital sovereignty" (Laura Pitel/Financial Times)
Laura Pitel / Financial Times : How a small German state's bid to replace Microsoft with open-source alternatives like Linux and Kamailio faces issues, as the EU pushes “digital sovereignty” — Schleswig-Holstein's radical tech overhaul offers Europe a live experiment in ending dependence on US Big Tech
Featured Podcasts
Uncapped with Jack Altman:
Brad Lightcap from OpenAI
Conversations with people I admire about things I'm genuinely interested in.
Subscribe to Uncapped with Jack Altman.
Channels with Peter Kafka:
Why We Need to Pay Attention to Elon Musk Again
Media and tech aren't just intersecting - they're fully intertwined. To understand how those worlds work, Peter Kafka talks to industry leaders, upstarts and observers.
Subscribe to Channels with Peter Kafka.
Cheeky Pint:
Compliance at scale and why TAM is a distraction with Christina Cacioppo of Vanta
Stripe cofounder John Collison interviews founders, builders, and leaders over a pint.
Subscribe to Cheeky Pint.
Tools and Weapons with Brad Smith:
Ryan Roslansky: Turning AI Anxiety into Skills for the Future of Work
Microsoft Vice Chair and President Brad Smith speaks with leaders in government, business, and culture to explore the most critical challenges at the intersection of technology and society.
Subscribe to Tools and Weapons with Brad Smith.
Invest Like the Best:
Sergey Levine - Building LLMs for the Physical World
The leading destination to learn about business and investing. We do this by showcasing exceptional talent and ideas.
Subscribe to Invest Like the Best.
The Talk Show With John Gruber:
'You're Going to Have the Niggles', With Christina Warren
The director's commentary track for Daring Fireball. Long digressions on Apple, technology, design, movies, and more.
Subscribe to The Talk Show With John Gruber.
Add your podcast here
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
open-sourceeuropeThe 22,000 Token Tax: Why I Killed My MCP Server
<p>I was at a company workshop, arguing with beginners about token costs.</p> <p>They wanted to save money. Reasonable instinct. They were spending maybe €25 a week on API calls and wanted to cut it to €20. I pushed back hard: "You're at the learning stage. Spend <em>more</em>, not less. Explore. Break things. Create costs.<br> Because while you're saving €5, I'm spending €600 a week — and I'll gladly spend €20 more if it means finishing a ticket in one session instead of two."</p> <p>Then I told them the one scenario where token consumption actually matters: when you need to prolong a session. Not to save money — to preserve context. Because when your session compacts or resets, you lose everything the model was holding in its head. And in the early days of Claude Code, there was no auto-

The Hidden Cost of Copy-Pasting Code Into ChatGPT
<p>AI coding tools promise faster development. The <a href="https://metr.org/blog/2025-07-10-early-2025-ai-developer-study/" rel="noopener noreferrer">METR study</a> found the opposite: experienced developers were 19% slower on complex tasks when using AI, even though they perceived themselves as 20% faster. The biggest contributor wasn't bad code generation. It was the workflow around it.</p> <p>Every time you alt-tab from your editor to a chat window, paste a function, explain what it does, describe the bug you're seeing, read the response, mentally translate it back to your codebase, switch back to your editor, and apply the changes, you're paying a productivity tax that compounds across a day of work. <a href="https://www.microsoft.com/en-us/research/uploads/prod/2022/07/Disrupted_and_

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge
<h2> Why Unmanaged IoT Is the Weakest Link in Your Network </h2> <p>The proliferation of Internet of Things (IoT) devices across enterprise environments has created a security paradox. Organizations deploy thousands of connected devices—IP cameras, building automation controllers, medical equipment, industrial sensors, point-of-sale terminals—to drive operational efficiency. Yet the vast majority of these devices are <strong>unmanaged</strong>: they cannot run endpoint agents, accept security patches on schedule, or participate in traditional identity frameworks. According to industry estimates, over 75% of IoT devices in production environments operate without any form of endpoint security.</p> <p>This creates a massive blind spot. Traditional perimeter-based security assumes that everyth
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Releases
Roguelike Devlog: Redesigning a Game UI With an AI 2D Game Maker
<p>Sector Scavengers is a spacefaring extraction roguelike where each run feeds a larger civilization-building meta game. This week was all about solving a UI problem that kept getting worse the longer I ignored it: one hub trying to do too much.</p> <p>What I learned quickly is that running both game modes through a single central hub was making both of them worse. Here is how I used Makko to work through it.</p> <h2> When One Screen Tries to Do Everything </h2> <p>My meta progression systems — crew advancement, station building, hardware research, void powers, and card unlocks — were all living in the same HUD as the controls for individual Expedition runs. On paper it sounded efficient. In practice it created a serious information architecture problem.</p> <p>The deeper I got into it, t

Shaping the UAE’s Digital Destiny: Building Sovereignty, Trust, and Resilience in the Cyber Era
Q. With the increasing reliance on digital infrastructure, how is the UAE addressing digital sovereignty to protect its critical assets and data from external threats? Lt. Colonel Saeed M. Al Shebli: Digital sovereignty, in my view, is no longer a technical concept; it’s a cornerstone of national independence and strategic stability. The UAE has been remarkably […] The post Shaping the UAE’s Digital Destiny: Building Sovereignty, Trust, and Resilience in the Cyber Era appeared first on EE Times . ]]>
Google's Veo 3.1 Lite Cuts API Costs in Half as OpenAI's Sora Exits the Market - Decrypt
<a href="https://news.google.com/rss/articles/CBMigwFBVV95cUxNTUZwMV9zbEhmbXlJcUNDdDZEckRyZTZBV3RLWnQ4Yk1pd3ZuT2pqNkhsQ3RVQTdsZWNnZUlFaXhnQUFlbGZPbVJWMnpVUHRIdE45UXlCZW5kZzdiaEljSVlPcXlPeVM4M25UbVp3c2RtdHpzUmVydmR3eWhsQ3Vfa19nRdIBiwFBVV95cUxPcTZkSE9ZSzFyUXR5bWdvc2VCXzlEVVBxemRTb3Q5ZDVJTlkyMW9qdDdPRnVyMkgzZmpnbmpaXzBLbE5KX2g0N216aWxqdmpjYU5RMm5rQ21wN1NxVllpMnNZU2szVFFKNlp1c0tZQ0N2WGVhQ0dqczJ4azI1Vmd3YzVvem1jRkRxYlRz?oc=5" target="_blank">Google's Veo 3.1 Lite Cuts API Costs in Half as OpenAI's Sora Exits the Market</a> <font color="#6f6f6f">Decrypt</font>


Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!