https://cloud.google.com/apis/design/\u003C/a>\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Microsoft REST API Guidelines\u003C/b>\u003Ca href=https://github.com/microsoft/api-guidelines/blob/vNext/azure/Guidelines.md>https://github.com/microsoft/api-guidelines/blob/vNext/azure/Guidelines.md\u003C/a>\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/restapi\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#restapi\u003C/a> \u003Ca href=\"/tag/systemdesign\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#systemdesign\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":324,"blocks":325,"version":67},1759999343023,[326,331,335,339,343,347,364,368,371,375,379,384,388,392,417,421,424,428,433,437,441,445,449,453,457,461,465,469,473,477,481,485,489,493,497,501,505,518,522,525,528,531,534,537,540,543,559,561,564,567,571,574,577,580,583,599,602,605,617,620,623,639,642,645,648,651,654,657,677,680,683,686,688,691,694,710,714,717,733,736,739,742,745,748,751,754,757,760,762,765,768,771,774,776,779,782,784,787,791,794,797,800,803,805,808,810,813,829],{"id":327,"type":105,"data":328},"e4a2b1c8d",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":329},{"url":330},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/4b327ca9-1572-4bd5-a7dc-de7ff364483b/1184.webp",{"id":332,"type":23,"data":333},"a9f8e7d6c",{"text":334,"level":82},"A Practical Guide to Designing CRUD APIs",{"id":336,"type":14,"data":337},"b5c4d3e2a",{"text":338},"Every time I created a new endpoint, I'd ask myself: \"How should I name this route?\" It felt like there had to be a set of rules for building consistent APIs. After exploring design diagrams, reading JJ Geewax's \u003Ci>API Design Patterns\u003C/i>, and studying guidelines from major tech companies, I realized a crucial point:",{"id":340,"type":112,"data":341},"f1e2d3c4b",{"quoteText":342,"authorText":107},"API design is a distinct discipline with its own principles and standards.",{"id":344,"type":14,"data":345},"c7b6a5f4e",{"text":346},"Following established design patterns delivers tangible results:",{"id":348,"type":38,"data":349},"d9e8f7a6b",{"style":40,"meta":350,"items":351},{},[352,356,360],{"content":353,"meta":354,"items":355},"\u003Cb>Developer-Friendly APIs:\u003C/b> Uniform patterns and web standards make your API intuitive to use.",{},[],{"content":357,"meta":358,"items":359},"\u003Cb>Reusability:\u003C/b> Both the business logic and the API itself become easier to reuse across projects.",{},[],{"content":361,"meta":362,"items":363},"\u003Cb>Predictability:\u003C/b> The interface remains clear and predictable for external clients and integrations.",{},[],{"id":365,"type":14,"data":366},"a3b2c1d0f",{"text":367},"The main challenge is that while standards exist, they often vary. Many look great on paper but are hard to apply to a simple CRUD application without complex business logic. \u003Cb>This article provides a concise cheat sheet for designing APIs for CRUD services\u003C/b>, showing a deliberate and consistent thought process.",{"id":369,"type":147,"data":370},"e9f8d7c6b",{},{"id":372,"type":23,"data":373},"b1a0f9e8d",{"text":374,"level":26},"Part 1: It All Starts with the Domain",{"id":376,"type":14,"data":377},"c2b1a0f9e",{"text":378},"A well-designed API begins with clearly defined \u003Cb>resources\u003C/b> and their interactions. When your domain model and its operations are clear, the HTTP layer becomes simple and predictable.",{"id":380,"type":105,"data":381},"d3c2b1a0f",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":382},{"url":383},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/a8449571-c31d-4e69-8dfd-3b720864ba91/1184.webp",{"id":385,"type":23,"data":386},"e4d3c2b1a",{"text":387,"level":82},"The Core Action Vocabulary",{"id":389,"type":14,"data":390},"f5e4d3c2b",{"text":391},"To achieve consistency, rely on five fundamental operations in your business logic:",{"id":393,"type":38,"data":394},"a6f5e4d3c",{"style":40,"meta":395,"items":396},{},[397,401,405,409,413],{"content":398,"meta":399,"items":400},"\u003Cb>GetResource:\u003C/b> Retrieve a specific resource.",{},[],{"content":402,"meta":403,"items":404},"\u003Cb>ListResources:\u003C/b> Retrieve a collection of resources (with filtering, sorting, and pagination).",{},[],{"content":406,"meta":407,"items":408},"\u003Cb>CreateResource:\u003C/b> Create a new resource.",{},[],{"content":410,"meta":411,"items":412},"\u003Cb>UpdateResource:\u003C/b> Modify a resource (partially or fully).",{},[],{"content":414,"meta":415,"items":416},"\u003Cb>DeleteResource:\u003C/b> Remove a resource.",{},[],{"id":418,"type":14,"data":419},"b7a6f5e4d",{"text":420},"Avoid method names like \u003Ccode>GetByOrganization\u003C/code>, \u003Ccode>Insert\u003C/code>, \u003Ccode>Upsert\u003C/code>, \u003Ccode>DeleteAll\u003C/code>, or \u003Ccode>FindOrCreate\u003C/code>. All variability should be handled through \u003Cb>parameters\u003C/b>, not by creating new method names.",{"id":422,"type":147,"data":423},"c8b7a6f5e",{},{"id":425,"type":23,"data":426},"d9c8b7a6f",{"text":427,"level":26},"Part 2: Standard API Methods",{"id":429,"type":105,"data":430},"e0d9c8b7a",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":431},{"url":432},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/dc815f98-5935-4941-8cae-461534673d1e/1184.webp",{"id":434,"type":23,"data":435},"f1e0d9c8b",{"text":436,"level":82},"The Resource Model",{"id":438,"type":14,"data":439},"a2f1e0d9c",{"text":440},"Here is an example model we'll use:",{"id":442,"type":33,"data":443},"b3a2f1e0d",{"code":444},"{\n \"id\": \"guid\",\n \"title\": \"string\",\n \"status\": \"active|archived|draft\"\n}",{"id":446,"type":23,"data":447},"c4b3a2f1e",{"text":448,"level":26},"1. Create a Resource",{"id":450,"type":14,"data":451},"d5c4b3a2f",{"text":452},"\u003Cb>POST \u003C/b>\u003Ccode>\u003Cb>/v1/resources\u003C/b>\u003C/code>\u003Cbr>Request Body:",{"id":454,"type":33,"data":455},"e6d5c4b3a",{"code":456},"{ \"title\": \"New resource\", \"status\": \"draft\" }",{"id":458,"type":14,"data":459},"f7e6d5c4b",{"text":460},"Response: \u003Cb>201 Created\u003C/b> with the newly created resource:",{"id":462,"type":33,"data":463},"a8f7e6d5c",{"code":464},"{ \"id\": \"guid\", \"title\": \"New resource\", \"status\": \"draft\" }",{"id":466,"type":23,"data":467},"b9a8f7e6d",{"text":468,"level":26},"2. Get a Specific Resource",{"id":470,"type":14,"data":471},"c0b9a8f7e",{"text":472},"\u003Cb>GET \u003C/b>\u003Ccode>\u003Cb>/v1/resources/{id}\u003C/b>\u003C/code>\u003Cbr>Response: \u003Cb>200 OK\u003C/b> with the resource, or \u003Cb>404 Not Found\u003C/b>.",{"id":474,"type":23,"data":475},"d1c0b9a8f",{"text":476,"level":26},"3. Get a Collection of Resources",{"id":478,"type":14,"data":479},"e2d1c0b9a",{"text":480},"\u003Cb>GET \u003C/b>\u003Ccode>\u003Cb>/v1/resources\u003C/b>\u003C/code>\u003Cbr>Response: \u003Cb>200 OK\u003C/b>:",{"id":482,"type":33,"data":483},"f3e2d1c0b",{"code":484},"{\n \"resources\": [\n { \"id\": \"guid\", \"title\": \"New resource\", \"status\": \"draft\" }\n ]\n}",{"id":486,"type":14,"data":487},"a4f3e2d1c",{"text":488},"Always return an \u003Cb>object instead of a raw array\u003C/b>. This makes it easier to extend the contract later with metadata or pagination. If no resources are found, return a \u003Cb>200 OK\u003C/b> with an empty collection.",{"id":490,"type":23,"data":491},"b5a4f3e2d",{"text":492,"level":26},"4. Replace a Resource (PUT)",{"id":494,"type":14,"data":495},"c6b5a4f3e",{"text":496},"\u003Cb>PUT \u003C/b>\u003Ccode>\u003Cb>/v1/resources/{id}\u003C/b>\u003C/code>\u003Cbr>The request body must contain the full representation of the resource.",{"id":498,"type":33,"data":499},"d7c6b5a4f",{"code":500},"{ \"title\": \"Updated\", \"status\": \"active\" }",{"id":502,"type":14,"data":503},"e8d7c6b5a",{"text":504},"Response Codes:",{"id":506,"type":38,"data":507},"f9e8d7c6b",{"style":40,"meta":508,"items":509},{},[510,514],{"content":511,"meta":512,"items":513},"\u003Cb>201 Created:\u003C/b> If the resource was created (if you allow client-specified IDs).",{},[],{"content":515,"meta":516,"items":517},"\u003Cb>200 OK:\u003C/b> If the resource existed and was replaced. Return the updated resource.",{},[],{"id":519,"type":14,"data":520},"a0f9e8d7c",{"text":521},"If a field is omitted from the request, it should be reset to its default value.",{"id":372,"type":23,"data":523},{"text":524,"level":26},"5. Partially Update a Resource (PATCH)",{"id":376,"type":14,"data":526},{"text":527},"\u003Cb>PATCH \u003C/b>\u003Ccode>\u003Cb>/v1/resources/{id}\u003C/b>\u003C/code>\u003Cbr>The request body should only contain the fields to be changed:",{"id":380,"type":33,"data":529},{"code":530},"{ \"status\": \"archived\" }",{"id":385,"type":14,"data":532},{"text":533},"Response: \u003Cb>200 OK\u003C/b> with the updated resource, or \u003Cb>404 Not Found\u003C/b>.",{"id":389,"type":23,"data":535},{"text":536,"level":26},"6. Delete a Resource",{"id":393,"type":14,"data":538},{"text":539},"\u003Cb>DELETE \u003C/b>\u003Ccode>\u003Cb>/v1/resources/{id}\u003C/b>\u003C/code>\u003Cbr>Response: \u003Cb>204 No Content\u003C/b> (with an empty body).",{"id":418,"type":23,"data":541},{"text":542,"level":82},"Key Takeaways",{"id":422,"type":38,"data":544},{"style":40,"meta":545,"items":546},{},[547,551,555],{"content":548,"meta":549,"items":550},"Always use \u003Cb>plural nouns\u003C/b> for resource collections in paths (e.g., \u003Ccode>/resources\u003C/code>).",{},[],{"content":552,"meta":553,"items":554},"For standard operations, the resource ID should \u003Cb>only be in the path\u003C/b> (e.g., \u003Ccode>/resources/{id}\u003C/code>).",{},[],{"content":556,"meta":557,"items":558},"Return the \u003Cb>full resource\u003C/b> on POST, PUT, and PATCH requests to simplify debugging and testing.",{},[],{"id":425,"type":147,"data":560},{},{"id":429,"type":23,"data":562},{"text":563,"level":26},"Part 3: Extending Standard Methods",{"id":434,"type":14,"data":565},{"text":566},"Now, let's enhance our basic operations without creating a messy explosion of new endpoints.",{"id":438,"type":105,"data":568},{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":569},{"url":570},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/5ffa948b-bd53-41f7-b528-3cc78843a8da/1184.webp",{"id":442,"type":23,"data":572},{"text":573,"level":82},"Pagination",{"id":446,"type":14,"data":575},{"text":576},"The simplest and most common method is \u003Cb>offset-based pagination\u003C/b> using \u003Ccode>skip\u003C/code> and \u003Ccode>take\u003C/code> parameters (or \u003Ccode>offset\u003C/code> and \u003Ccode>limit\u003C/code>).",{"id":450,"type":14,"data":578},{"text":579},"\u003Cb>GET\u003C/b> \u003Ccode>/v1/resources?skip=20&take=10\u003C/code> — Skips the first 20 resources and retrieves the next 10.\u003Cbr>Response:",{"id":454,"type":33,"data":581},{"code":582},"{\n \"resources\": [\n { \"id\": \"guid\", \"title\": \"...\" }\n ],\n \"total\": 350\n}",{"id":458,"type":38,"data":584},{"style":40,"meta":585,"items":586},{},[587,591,595],{"content":588,"meta":589,"items":590},"Including \u003Ccode>total\u003C/code> in the response helps the client understand if there are more pages to fetch.",{},[],{"content":592,"meta":593,"items":594},"Always sort results by a default key (like creation date) to ensure \u003Cb>deterministic\u003C/b> responses.",{},[],{"content":596,"meta":597,"items":598},"Set a hard \u003Cb>maximum limit\u003C/b> for the \u003Ccode>take\u003C/code> parameter to prevent performance issues.",{},[],{"id":462,"type":23,"data":600},{"text":601,"level":82},"Filtering",{"id":466,"type":14,"data":603},{"text":604},"The most straightforward approach is to use \u003Cb>explicit query parameters\u003C/b> for each filter. Use operator suffixes for more complex queries:",{"id":470,"type":38,"data":606},{"style":40,"meta":607,"items":608},{},[609,613],{"content":610,"meta":611,"items":612},"\u003Ccode>_eq\u003C/code> (default, can be omitted), \u003Ccode>_ne\u003C/code>, \u003Ccode>_lt\u003C/code>, \u003Ccode>_gt\u003C/code>, \u003Ccode>_lte\u003C/code>, \u003Ccode>_gte\u003C/code>",{},[],{"content":614,"meta":615,"items":616},"\u003Ccode>_in\u003C/code>, \u003Ccode>_nin\u003C/code> for multiple values",{},[],{"id":474,"type":14,"data":618},{"text":619},"Examples:",{"id":478,"type":33,"data":621},{"code":622},"GET /v1/resources?status_in=active,draft\nGET /v1/resources?title_eq=Design\nGET /v1/resources?meta_created_at_gte=2023-01-01",{"id":482,"type":38,"data":624},{"style":40,"meta":625,"items":626},{},[627,631,635],{"content":628,"meta":629,"items":630},"For complex filtering (e.g., on nested arrays), consider a dedicated search endpoint that accepts a \u003Cb>POST\u003C/b> request with a body.",{},[],{"content":632,"meta":633,"items":634},"\u003Cb>Ignore\u003C/b> unknown query parameters by default.",{},[],{"content":636,"meta":637,"items":638},"Use a dedicated \u003Ccode>search\u003C/code> parameter for full-text search.",{},[],{"id":486,"type":23,"data":640},{"text":641,"level":82},"Sorting",{"id":490,"type":14,"data":643},{"text":644},"Similar to filtering, use explicit parameters like \u003Ccode>created_at_sort=asc|desc\u003C/code>. If the parameter is absent, the field is not used for sorting.",{"id":494,"type":33,"data":646},{"code":647},"GET /v1/resources?created_at_sort=asc\nGET /v1/resources?created_at_sort=asc&title_sort=desc",{"id":498,"type":112,"data":649},{"quoteText":650,"authorText":107},"Using generic `orderby` or `filter` parameters often leads to parsing headaches and tightly couples the API to the internal data model. Explicit parameters make the contract clearer and simplify implementation.",{"id":502,"type":23,"data":652},{"text":653,"level":82},"Soft Delete",{"id":506,"type":14,"data":655},{"text":656},"Instead of permanently deleting data, mark it as deleted. Add a nullable \u003Ccode>deleted_at\u003C/code> field to your model.",{"id":519,"type":38,"data":658},{"style":40,"meta":659,"items":660},{},[661,665,669,673],{"content":662,"meta":663,"items":664},"\u003Cb>Archive:\u003C/b> \u003Ccode>DELETE /v1/resources/{id}\u003C/code> returns \u003Cb>204\u003C/b> and sets the \u003Ccode>deleted_at\u003C/code> timestamp.",{},[],{"content":666,"meta":667,"items":668},"\u003Cb>Restore:\u003C/b> \u003Ccode>PATCH /v1/resources/{id}/restore\u003C/code> returns \u003Cb>200\u003C/b>, sets \u003Ccode>deleted_at\u003C/code> to \u003Ccode>null\u003C/code>, and returns the resource.",{},[],{"content":670,"meta":671,"items":672},"\u003Cb>List with deleted:\u003C/b> \u003Ccode>GET /v1/resources?include_deleted=true\u003C/code>.",{},[],{"content":674,"meta":675,"items":676},"\u003Cb>Permanently delete:\u003C/b> \u003Ccode>DELETE /v1/resources/{id}?force=true\u003C/code> returns \u003Cb>204\u003C/b>.",{},[],{"id":372,"type":23,"data":678},{"text":679,"level":82},"Putting It All Together",{"id":376,"type":14,"data":681},{"text":682},"Here's a request combining pagination, filtering, and sorting:",{"id":380,"type":33,"data":684},{"code":685},"GET /v1/resources?skip=10&take=5&status_in=active,draft&created_at_sort=desc&include_deleted=false",{"id":385,"type":147,"data":687},{},{"id":389,"type":23,"data":689},{"text":690,"level":26},"Part 4: Custom Methods and Batch Operations",{"id":393,"type":14,"data":692},{"text":693},"Standard GET, POST, PUT, PATCH, and DELETE methods cover about 80% of CRUD needs. The remaining 20% involve custom domain actions that:",{"id":418,"type":38,"data":695},{"style":40,"meta":696,"items":697},{},[698,702,706],{"content":699,"meta":700,"items":701},"Change a resource's state in a way that isn't a simple update (e.g., \"approve\", \"cancel\", \"apply discount\").",{},[],{"content":703,"meta":704,"items":705},"Trigger a calculation (e.g., \"calculate shipping rate\").",{},[],{"content":707,"meta":708,"items":709},"Have side effects without creating a resource directly (e.g., \"view resource\").",{},[],{"id":422,"type":105,"data":711},{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":712},{"url":713},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/f2ec9543-603b-4340-94b6-c297c55a911d/1184.webp",{"id":425,"type":23,"data":715},{"text":716,"level":82},"Guiding Principles for Custom Methods",{"id":429,"type":38,"data":718},{"style":40,"meta":719,"items":720},{},[721,725,729],{"content":722,"meta":723,"items":724},"Place a \u003Cb>verb\u003C/b> after the resource ID: \u003Ccode>POST /v1/resources/{id}/apply-discount\u003C/code>.",{},[],{"content":726,"meta":727,"items":728},"Use \u003Cb>POST\u003C/b> for actions that have side effects.",{},[],{"content":730,"meta":731,"items":732},"Use \u003Cb>GET\u003C/b> for read-only actions like calculations that don't change state.",{},[],{"id":434,"type":23,"data":734},{"text":735,"level":26},"Batch Operations",{"id":438,"type":14,"data":737},{"text":738},"Batch operations reduce the number of API calls, allow for atomic changes to multiple resources, and simplify client-side logic.",{"id":442,"type":23,"data":740},{"text":741,"level":82},"Batch Read",{"id":446,"type":14,"data":743},{"text":744},"Avoid passing IDs in the query string, as you risk exceeding URL length limits. Instead, use a POST request.",{"id":450,"type":33,"data":746},{"code":747},"POST /v1/resources/batch-get",{"id":454,"type":14,"data":749},{"text":750},"Request Body:",{"id":458,"type":33,"data":752},{"code":753},"{ \"ids\": [\"guid-1\", \"guid-2\"] }",{"id":462,"type":23,"data":755},{"text":756,"level":82},"Batch Create",{"id":466,"type":33,"data":758},{"code":759},"POST /v1/resources/batch",{"id":470,"type":14,"data":761},{"text":750},{"id":474,"type":33,"data":763},{"code":764},"{\n \"resources\": [\n { \"title\": \"A\", \"status\": \"draft\" },\n { \"title\": \"B\", \"status\": \"active\" }\n ]\n}",{"id":478,"type":14,"data":766},{"text":767},"Response: \u003Cb>201 Created\u003C/b> with an array of the newly created resources.",{"id":482,"type":23,"data":769},{"text":770,"level":82},"Batch Delete",{"id":486,"type":33,"data":772},{"code":773},"POST /v1/resources/batch-delete",{"id":490,"type":14,"data":775},{"text":750},{"id":494,"type":33,"data":777},{"code":778},"{\n \"ids\": [\"guid-1\", \"guid-2\"],\n \"force\": false\n}",{"id":498,"type":14,"data":780},{"text":781},"Response: \u003Cb>200 OK\u003C/b>. According to \u003Cb>RFC 9110\u003C/b>, it's recommended to use \u003Cb>POST with a body\u003C/b> for this operation instead of a DELETE method.",{"id":502,"type":147,"data":783},{},{"id":506,"type":23,"data":785},{"text":786,"level":26},"Part 5: Frequently Asked Questions",{"id":519,"type":105,"data":788},{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":789},{"url":790},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/02891b5f-34f9-471c-8e89-9adf6dc2f17a/1184.webp",{"id":372,"type":23,"data":792},{"text":793,"level":82},"Should I always return the full resource on POST/PUT/PATCH?",{"id":376,"type":14,"data":795},{"text":796},"Yes. For typical CRUD services, this simplifies development by reducing the need for extra requests. It also makes debugging and testing much easier.",{"id":380,"type":23,"data":798},{"text":799,"level":82},"Won't I hit query parameter limits with complex filtering?",{"id":385,"type":14,"data":801},{"text":802},"For most CRUD applications with a dozen or so explicit filters, this isn't an issue. When you have a large number of criteria, use a dedicated search endpoint that accepts a \u003Cb>POST\u003C/b> request with the filter parameters in the body.",{"id":389,"type":147,"data":804},{},{"id":418,"type":14,"data":806},{"text":807},"This guide intentionally omits topics like idempotency, ETags, and versioning, which are well-covered in official guidelines. The goal was to demonstrate that a small, clear set of rules can solve 80% of common API design challenges. By sticking to these principles, you reduce duplication, simplify maintenance, and leave room for future expansion. The other 20% of cases will require thoughtful decisions, and that's when you should consult industry standards.",{"id":422,"type":147,"data":809},{},{"id":425,"type":23,"data":811},{"text":812,"level":26},"Useful Links",{"id":429,"type":38,"data":814},{"style":40,"meta":815,"items":816},{},[817,821,825],{"content":818,"meta":819,"items":820},"\u003Cb>RFC 9110 — HTTP Semantics (methods, codes, headers)\u003C/b>\u003Ca href=\"https://datatracker.ietf.org/doc/html/rfc9110\">https://datatracker.ietf.org/doc/html/rfc9110\u003C/a>",{},[],{"content":822,"meta":823,"items":824},"\u003Cb>Google API Design Guide\u003C/b>\u003Ca href=\"https://cloud.google.com/apis/design/\">https://cloud.google.com/apis/design/\u003C/a>",{},[],{"content":826,"meta":827,"items":828},"\u003Cb>Microsoft REST API Guidelines\u003C/b>\u003Ca href=\"https://github.com/microsoft/api-guidelines/blob/vNext/azure/Guidelines.md\">https://github.com/microsoft/api-guidelines/blob/vNext/azure/Guidelines.md\u003C/a>",{},[],{"id":830,"type":14,"data":831},"v-L6i8yKBh",{"text":832},"#restapi #systemdesign",{"authorId":834,"name":835,"avatar":836,"username":837},"bje9Vrx386VzjYXPjj8t2UsYtDv1","Gloria Mazzi","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/900f4bde-d2bc-4a20-9ae9-4c5d48996901/1184.webp","id191722913817","SYSTEM_DESIGN",[840],{"emojiId":86,"count":82,"reactedByUser":76},{"comments":81,"favorites":82,"views":842,"hits":843},14,201,"2025-10-09T08:39:16.61","2025-10-09T10:37:05.677",{"postId":847,"title":848,"slug":849,"preview":850,"html":851,"content":852,"author":893,"authorUsername":897,"topic":77,"status":83,"reactions":898,"counters":900,"createdAt":902,"updatedAt":903,"publishedPostId":88,"favorite":76},"a113f154-f9b1-4e8a-a40b-3694c477e82f","Google's Next-Gen AI Video Model, Veo 3.1, Surfaces Online","766425-googles-next-gen-ai-video-model-veo-3-1-surfaces-online","\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Details of Veo 3.1, Google's updated AI video generation model, have surfaced \u003Ca href=\"https://higgsfield.ai/veo3.1\">on the Higgsfield AI\u003C/a> platform and Google's own Vertex AI cloud service. While the tool isn't public yet, the leaks point to several significant upgrades over its predecessor.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/705aed82-9dc2-485d-9834-bd08cea35c1b/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Details of Veo 3.1, Google's updated AI video generation model, have surfaced \u003Ca href=\"https://higgsfield.ai/veo3.1\">on the Higgsfield AI\u003C/a> platform and Google's own Vertex AI cloud service. While the tool isn't public yet, the leaks point to several significant upgrades over its predecessor.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/705aed82-9dc2-485d-9834-bd08cea35c1b/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Key Leaked Features\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>1080p Resolution & Longer Clips:\u003C/b> The model is expected to generate videos in 1080p with a duration exceeding 30 seconds—a major leap from the 8-second limit of the previous version.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Scene Builder for Consistency:\u003C/b> A new 'scene builder' feature will likely analyze existing footage to generate subsequent clips, ensuring consistent characters and scene elements across shots.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Multi-Prompting Capabilities:\u003C/b> Veo 3.1 may support multi-prompting, allowing users to define different instructions for various scenes within a single video timeline.\u003C/li>\u003C/ul>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">An official announcement is anticipated at Google's upcoming 'Gemini at Work' event, which will showcase the latest AI solutions for business and productivity.\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/ai\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#ai\u003C/a> \u003Ca href=\"/tag/news\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#news\u003C/a> \u003Ca href=\"/tag/google\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#google\u003C/a> \u003Ca href=\"/tag/veo3\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#veo3\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":853,"blocks":854,"version":67},1759998221194,[855,859,864,868,885,889],{"id":856,"type":14,"data":857},"B9dGh5jK8L",{"text":858},"Details of Veo 3.1, Google's updated AI video generation model, have surfaced \u003Ca href=\"https://higgsfield.ai/veo3.1\">on the Higgsfield AI\u003C/a> platform and Google's own Vertex AI cloud service. While the tool isn't public yet, the leaks point to several significant upgrades over its predecessor.",{"id":860,"type":105,"data":861},"f55f33c6-7",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":862},{"url":863},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/705aed82-9dc2-485d-9834-bd08cea35c1b/1184.webp",{"id":865,"type":23,"data":866},"C7kMn9pQ2R",{"text":867,"level":26},"Key Leaked Features",{"id":869,"type":38,"data":870},"D1sVt3wX6Z",{"style":40,"meta":871,"items":872},{},[873,877,881],{"content":874,"meta":875,"items":876},"\u003Cb>1080p Resolution & Longer Clips:\u003C/b> The model is expected to generate videos in 1080p with a duration exceeding 30 seconds—a major leap from the 8-second limit of the previous version.",{},[],{"content":878,"meta":879,"items":880},"\u003Cb>Scene Builder for Consistency:\u003C/b> A new 'scene builder' feature will likely analyze existing footage to generate subsequent clips, ensuring consistent characters and scene elements across shots.",{},[],{"content":882,"meta":883,"items":884},"\u003Cb>Multi-Prompting Capabilities:\u003C/b> Veo 3.1 may support multi-prompting, allowing users to define different instructions for various scenes within a single video timeline.",{},[],{"id":886,"type":112,"data":887},"E5uFy7zH9V",{"quoteText":888,"authorText":107},"An official announcement is anticipated at Google's upcoming 'Gemini at Work' event, which will showcase the latest AI solutions for business and productivity.",{"id":890,"type":14,"data":891},"qtbF-W3nDZ",{"text":892},"#ai #news #google #veo3",{"authorId":894,"name":895,"avatar":896,"username":897},"MNVqYgN2cURXIJ86dc0aFhblcZk2","Anna Aasen","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/b46d079e-9436-4501-a3f2-ae09b8b0be0f/1184.webp","id451389229890",[899],{"emojiId":26,"count":82,"reactedByUser":76},{"comments":81,"favorites":82,"views":169,"hits":901},192,"2025-10-09T08:21:00.453","2025-10-09T10:22:50.646",{"postId":905,"title":906,"slug":907,"preview":908,"html":909,"content":910,"author":1115,"authorUsername":1119,"topic":1120,"status":83,"reactions":1121,"counters":1123,"createdAt":1126,"updatedAt":1127,"publishedPostId":88,"favorite":76},"5817d45d-f8a1-43fc-937d-9ecb55df32ac","The Future of Cloud Computing: AI, Multi-Cloud, and the $723 Billion Revolution","385268-the-future-of-cloud-computing-ai-multi-cloud-and-the-723-billion-revolution","\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The cloud computing industry is in the midst of its most significant transformation yet. Fueled by the integration of artificial intelligence, global spending on public cloud services is projected to hit \u003Cb>$723.4 billion in 2025\u003C/b>, a staggering 21% increase from 2024. With 72% of companies already leveraging generative AI, this trend is radically reshaping resource allocation and strategic priorities across the board. This isn't just a gradual evolution—it's a fundamental shift in digital infrastructure.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/f90698b8-2f2b-4a93-b5be-8124208e384a/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The cloud computing industry is in the midst of its most significant transformation yet. Fueled by the integration of artificial intelligence, global spending on public cloud services is projected to hit \u003Cb>$723.4 billion in 2025\u003C/b>, a staggering 21% increase from 2024. With 72% of companies already leveraging generative AI, this trend is radically reshaping resource allocation and strategic priorities across the board. This isn't just a gradual evolution—it's a fundamental shift in digital infrastructure.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/f90698b8-2f2b-4a93-b5be-8124208e384a/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">AI Takes Center Stage in Cloud Infrastructure\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The explosive growth of AI workloads is the single most significant development in the cloud landscape. Gartner predicts that by 2029, a remarkable \u003Cb>50% of all cloud computing resources\u003C/b> will be dedicated to AI applications. This seismic shift is already evident in the financial performance of major cloud providers:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>Amazon Web Services (AWS):\u003C/b> Posted revenues of \u003Cb>$27.5 billion\u003C/b> in Q3 2024, up 19% year-over-year.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Microsoft Azure:\u003C/b> Reached \u003Cb>$26.7 billion\u003C/b>, securing a 20% market share.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Google Cloud:\u003C/b> Showed impressive growth with \u003Cb>$13.6 billion\u003C/b> in Q2 2025, a 32% year-over-year increase.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Multi-Cloud is the New Standard\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Single-vendor strategies are becoming obsolete, with \u003Cb>80% of companies now operating in multi-cloud environments\u003C/b>. This approach mitigates vendor lock-in and provides the flexibility to leverage best-in-class solutions from different providers.\u003C/p>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small block-quote--has-author\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">Multi-cloud is no longer just about risk mitigation. It’s about accessing best-of-breed AI from AWS, hybrid capabilities from Azure, and Google Cloud's leadership in analytics—all within a unified strategy.\u003C/div>\u003Cdiv class=\"block-quote__author\">CIO of a Fortune 500 company\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Current market share distribution highlights this diverse ecosystem:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>AWS:\u003C/b> Leads with a 32% global share, excelling in infrastructure.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Azure:\u003C/b> Holds 23%, dominating the hybrid cloud space.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Google Cloud:\u003C/b> Owns 12%, with strengths in AI/ML and analytics.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Others:\u003C/b> The remaining 33% is shared by providers like Alibaba Cloud, IBM, and Oracle.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Serverless Computing Reaches Critical Mass\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Serverless architecture, which abstracts server management away from developers, is gaining massive momentum. By 2025, adoption is expected to exceed \u003Cb>75% among cloud users\u003C/b>, with the market projected to grow by 23.17% annually through 2028 as companies focus on reducing operational overhead and improving scalability.\u003C/p>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small block-quote--has-author\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">A serverless architecture allows our teams to focus on innovation instead of infrastructure management. We’ve achieved 40% faster deployment cycles and 30% cost savings on variable workloads.\u003C/div>\u003Cdiv class=\"block-quote__author\">CTO of a major e-commerce company\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Edge Computing: A Strategic Priority\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Edge computing, which processes data closer to its source, has moved from an experimental phase to a strategic imperative. The global market is set to reach \u003Cb>$261 billion in 2025\u003C/b>, driven by low-latency applications like IoT, AR/VR, and autonomous systems. The Asia-Pacific region is leading the charge, leveraging advanced 5G networks for smart city and industrial automation projects.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">The Spotlight on Cost Optimization\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Despite rising investments, an estimated \u003Cb>32% of cloud spending is wasted\u003C/b> due to over-provisioning and resource mismanagement. The \u003Ci>CloudZero 2024 State of Cloud Cost Intelligence\u003C/i> report reveals a critical gap:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">Only \u003Cb>30%\u003C/b> of companies have a clear understanding of their cloud spending.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>60%\u003C/b> experience cloud costs that exceed their initial budgets.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>78%\u003C/b> have made cost optimization their top priority for 2025.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Security and Compliance Shape Strategy\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Cloud security remains a major concern. A recent Fortinet survey found that 95% of businesses are still worried about cloud security, with misconfigurations accounting for 68% of incidents. In response, companies are increasingly adopting zero-trust architectures and advanced monitoring. The high stakes are clear: the average cost of a data breach reached \u003Cb>$4.88 million in 2024\u003C/b>, soaring to over $10.9 million in the healthcare sector.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Global and Industry-Specific Cloud Trends\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Cloud adoption varies significantly by region and industry:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>North America:\u003C/b> Remains the market leader with a mature infrastructure.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Asia-Pacific:\u003C/b> Demonstrates the fastest growth, led by India, China, and Southeast Asia.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Europe:\u003C/b> Focuses on data sovereignty and GDPR compliance, driving hybrid and multi-cloud solutions.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Finance:\u003C/b> 81% of insurers use the cloud for claims processing, with AI reducing manual work by 40%.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Healthcare:\u003C/b> AI-powered diagnostics and telehealth platforms are driving demand, though data privacy remains a challenge.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Retail:\u003C/b> E-commerce leverages serverless architectures to scale during peak demand and optimize costs.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Manufacturing:\u003C/b> IoT and edge computing are used for predictive maintenance and production optimization.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">The Road Ahead: Key Predictions for 2025/2026\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Col class=\"block-content content-block-list-ordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>AI-First Cloud:\u003C/b> Cloud strategies will be designed with AI as the central component.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Green Cloud Computing:\u003C/b> A greater emphasis on energy efficiency and renewable energy sources.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Specialized Industry Clouds:\u003C/b> Platforms tailored to specific industry needs for security and compliance.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Seamless Interoperability:\u003C/b> Open-source standards will become crucial for multi-cloud environments.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Intelligent Cost Optimization:\u003C/b> A shift from basic monitoring to granular unit-cost analysis.\u003C/li>\u003C/ol>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/cloud\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#cloud\u003C/a> \u003Ca href=\"/tag/ai\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#ai\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":911,"blocks":912,"version":67},1759999924825,[913,917,922,926,930,947,951,955,960,964,985,989,993,998,1002,1006,1010,1014,1031,1035,1039,1043,1047,1080,1084,1111],{"id":914,"type":14,"data":915},"f8g9h0i1j",{"text":916},"The cloud computing industry is in the midst of its most significant transformation yet. Fueled by the integration of artificial intelligence, global spending on public cloud services is projected to hit \u003Cb>$723.4 billion in 2025\u003C/b>, a staggering 21% increase from 2024. With 72% of companies already leveraging generative AI, this trend is radically reshaping resource allocation and strategic priorities across the board. This isn't just a gradual evolution—it's a fundamental shift in digital infrastructure.",{"id":918,"type":105,"data":919},"k2l3m4n5o",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":920},{"url":921},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/f90698b8-2f2b-4a93-b5be-8124208e384a/1184.webp",{"id":923,"type":23,"data":924},"p6q7r8s9t",{"text":925,"level":26},"AI Takes Center Stage in Cloud Infrastructure",{"id":927,"type":14,"data":928},"u0v1w2x3y",{"text":929},"The explosive growth of AI workloads is the single most significant development in the cloud landscape. Gartner predicts that by 2029, a remarkable \u003Cb>50% of all cloud computing resources\u003C/b> will be dedicated to AI applications. This seismic shift is already evident in the financial performance of major cloud providers:",{"id":931,"type":38,"data":932},"z4a5b6c7d",{"style":40,"meta":933,"items":934},{},[935,939,943],{"content":936,"meta":937,"items":938},"\u003Cb>Amazon Web Services (AWS):\u003C/b> Posted revenues of \u003Cb>$27.5 billion\u003C/b> in Q3 2024, up 19% year-over-year.",{},[],{"content":940,"meta":941,"items":942},"\u003Cb>Microsoft Azure:\u003C/b> Reached \u003Cb>$26.7 billion\u003C/b>, securing a 20% market share.",{},[],{"content":944,"meta":945,"items":946},"\u003Cb>Google Cloud:\u003C/b> Showed impressive growth with \u003Cb>$13.6 billion\u003C/b> in Q2 2025, a 32% year-over-year increase.",{},[],{"id":948,"type":23,"data":949},"e8f9g0h1i",{"text":950,"level":26},"Multi-Cloud is the New Standard",{"id":952,"type":14,"data":953},"j2k3l4m5n",{"text":954},"Single-vendor strategies are becoming obsolete, with \u003Cb>80% of companies now operating in multi-cloud environments\u003C/b>. This approach mitigates vendor lock-in and provides the flexibility to leverage best-in-class solutions from different providers.",{"id":956,"type":112,"data":957},"o6p7q8r9s",{"quoteText":958,"authorText":959},"Multi-cloud is no longer just about risk mitigation. It’s about accessing best-of-breed AI from AWS, hybrid capabilities from Azure, and Google Cloud's leadership in analytics—all within a unified strategy.","CIO of a Fortune 500 company",{"id":961,"type":14,"data":962},"t0u1v2w3x",{"text":963},"Current market share distribution highlights this diverse ecosystem:",{"id":965,"type":38,"data":966},"y4z5a6b7c",{"style":40,"meta":967,"items":968},{},[969,973,977,981],{"content":970,"meta":971,"items":972},"\u003Cb>AWS:\u003C/b> Leads with a 32% global share, excelling in infrastructure.",{},[],{"content":974,"meta":975,"items":976},"\u003Cb>Azure:\u003C/b> Holds 23%, dominating the hybrid cloud space.",{},[],{"content":978,"meta":979,"items":980},"\u003Cb>Google Cloud:\u003C/b> Owns 12%, with strengths in AI/ML and analytics.",{},[],{"content":982,"meta":983,"items":984},"\u003Cb>Others:\u003C/b> The remaining 33% is shared by providers like Alibaba Cloud, IBM, and Oracle.",{},[],{"id":986,"type":23,"data":987},"d8e9f0g1h",{"text":988,"level":26},"Serverless Computing Reaches Critical Mass",{"id":990,"type":14,"data":991},"i2j3k4l5m",{"text":992},"Serverless architecture, which abstracts server management away from developers, is gaining massive momentum. By 2025, adoption is expected to exceed \u003Cb>75% among cloud users\u003C/b>, with the market projected to grow by 23.17% annually through 2028 as companies focus on reducing operational overhead and improving scalability.",{"id":994,"type":112,"data":995},"n6o7p8q9r",{"quoteText":996,"authorText":997},"A serverless architecture allows our teams to focus on innovation instead of infrastructure management. We’ve achieved 40% faster deployment cycles and 30% cost savings on variable workloads.","CTO of a major e-commerce company",{"id":999,"type":23,"data":1000},"s0t1u2v3w",{"text":1001,"level":26},"Edge Computing: A Strategic Priority",{"id":1003,"type":14,"data":1004},"x4y5z6a7b",{"text":1005},"Edge computing, which processes data closer to its source, has moved from an experimental phase to a strategic imperative. The global market is set to reach \u003Cb>$261 billion in 2025\u003C/b>, driven by low-latency applications like IoT, AR/VR, and autonomous systems. The Asia-Pacific region is leading the charge, leveraging advanced 5G networks for smart city and industrial automation projects.",{"id":1007,"type":23,"data":1008},"c8d9e0f1g",{"text":1009,"level":26},"The Spotlight on Cost Optimization",{"id":1011,"type":14,"data":1012},"h2i3j4k5l",{"text":1013},"Despite rising investments, an estimated \u003Cb>32% of cloud spending is wasted\u003C/b> due to over-provisioning and resource mismanagement. The \u003Ci>CloudZero 2024 State of Cloud Cost Intelligence\u003C/i> report reveals a critical gap:",{"id":1015,"type":38,"data":1016},"m6n7o8p9q",{"style":40,"meta":1017,"items":1018},{},[1019,1023,1027],{"content":1020,"meta":1021,"items":1022},"Only \u003Cb>30%\u003C/b> of companies have a clear understanding of their cloud spending.",{},[],{"content":1024,"meta":1025,"items":1026},"\u003Cb>60%\u003C/b> experience cloud costs that exceed their initial budgets.",{},[],{"content":1028,"meta":1029,"items":1030},"\u003Cb>78%\u003C/b> have made cost optimization their top priority for 2025.",{},[],{"id":1032,"type":23,"data":1033},"r0s1t2u3v",{"text":1034,"level":26},"Security and Compliance Shape Strategy",{"id":1036,"type":14,"data":1037},"w4x5y6z7a",{"text":1038},"Cloud security remains a major concern. A recent Fortinet survey found that 95% of businesses are still worried about cloud security, with misconfigurations accounting for 68% of incidents. In response, companies are increasingly adopting zero-trust architectures and advanced monitoring. The high stakes are clear: the average cost of a data breach reached \u003Cb>$4.88 million in 2024\u003C/b>, soaring to over $10.9 million in the healthcare sector.",{"id":1040,"type":23,"data":1041},"b8c9d0e1f",{"text":1042,"level":26},"Global and Industry-Specific Cloud Trends",{"id":1044,"type":14,"data":1045},"g2h3i4j5k",{"text":1046},"Cloud adoption varies significantly by region and industry:",{"id":1048,"type":38,"data":1049},"l6m7n8o9p",{"style":40,"meta":1050,"items":1051},{},[1052,1056,1060,1064,1068,1072,1076],{"content":1053,"meta":1054,"items":1055},"\u003Cb>North America:\u003C/b> Remains the market leader with a mature infrastructure.",{},[],{"content":1057,"meta":1058,"items":1059},"\u003Cb>Asia-Pacific:\u003C/b> Demonstrates the fastest growth, led by India, China, and Southeast Asia.",{},[],{"content":1061,"meta":1062,"items":1063},"\u003Cb>Europe:\u003C/b> Focuses on data sovereignty and GDPR compliance, driving hybrid and multi-cloud solutions.",{},[],{"content":1065,"meta":1066,"items":1067},"\u003Cb>Finance:\u003C/b> 81% of insurers use the cloud for claims processing, with AI reducing manual work by 40%.",{},[],{"content":1069,"meta":1070,"items":1071},"\u003Cb>Healthcare:\u003C/b> AI-powered diagnostics and telehealth platforms are driving demand, though data privacy remains a challenge.",{},[],{"content":1073,"meta":1074,"items":1075},"\u003Cb>Retail:\u003C/b> E-commerce leverages serverless architectures to scale during peak demand and optimize costs.",{},[],{"content":1077,"meta":1078,"items":1079},"\u003Cb>Manufacturing:\u003C/b> IoT and edge computing are used for predictive maintenance and production optimization.",{},[],{"id":1081,"type":23,"data":1082},"q0r1s2t3u",{"text":1083,"level":26},"The Road Ahead: Key Predictions for 2025/2026",{"id":1085,"type":38,"data":1086},"v4w5x6y7z",{"style":1087,"meta":1088,"items":1090},"ordered",{"counterType":1089},"numeric",[1091,1095,1099,1103,1107],{"content":1092,"meta":1093,"items":1094},"\u003Cb>AI-First Cloud:\u003C/b> Cloud strategies will be designed with AI as the central component.",{},[],{"content":1096,"meta":1097,"items":1098},"\u003Cb>Green Cloud Computing:\u003C/b> A greater emphasis on energy efficiency and renewable energy sources.",{},[],{"content":1100,"meta":1101,"items":1102},"\u003Cb>Specialized Industry Clouds:\u003C/b> Platforms tailored to specific industry needs for security and compliance.",{},[],{"content":1104,"meta":1105,"items":1106},"\u003Cb>Seamless Interoperability:\u003C/b> Open-source standards will become crucial for multi-cloud environments.",{},[],{"content":1108,"meta":1109,"items":1110},"\u003Cb>Intelligent Cost Optimization:\u003C/b> A shift from basic monitoring to granular unit-cost analysis.",{},[],{"id":1112,"type":14,"data":1113},"f2g3h4i5j",{"text":1114},"#cloud #ai",{"authorId":1116,"name":1117,"avatar":1118,"username":1119},"UlGvGXQ817XJmjaYxHY41mh6ihm2","Matteo Romano","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/3d3ece27-85ce-4f04-a7a1-07e208a84e11/592.webp","id538394532786","CLOUD",[1122],{"emojiId":307,"count":82,"reactedByUser":76},{"comments":81,"favorites":82,"views":1124,"hits":1125},6,132,"2025-10-09T08:40:32.117","2025-10-09T10:22:44.964",{"postId":1129,"title":1130,"slug":1131,"preview":1132,"html":1133,"content":1134,"author":1241,"authorUsername":1245,"topic":1246,"status":83,"reactions":1247,"counters":1250,"createdAt":1252,"updatedAt":1253,"publishedPostId":88,"favorite":76},"276b19d5-b09e-40c2-bd06-2a41d3668714","Redis Warned of a 13-Year Critical Vulnerability in the Project Code","722578-redis-warned-of-13-year-critical-vulnerability-in-code","\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The Redis security team has \u003Ca href=\"https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/\">released patches\u003C/a> for a maximum-severity vulnerability that could allow attackers to achieve remote code execution (RCE) on thousands of instances. Incredibly, the flaw has been present in the project's codebase for 13 years.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/baf91f4f-bf3b-4ed7-a4b2-7464abe2ae8a/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The Redis security team has \u003Ca href=\"https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/\">released patches\u003C/a> for a maximum-severity vulnerability that could allow attackers to achieve remote code execution (RCE) on thousands of instances. Incredibly, the flaw has been present in the project's codebase for 13 years.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/baf91f4f-bf3b-4ed7-a4b2-7464abe2ae8a/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Understanding the 'RediShell' Vulnerability\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Redis (Remote Dictionary Server) is a popular open-source, in-memory data structure store used as a database, cache, and message broker in approximately 75% of cloud environments. Its primary advantage is providing ultra-fast data access by storing data in RAM.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Tracked as \u003Ca href=\"https://nvd.nist.gov/vuln/detail/CVE-2025-49844\">CVE-2025-49844,\u003C/a> the vulnerability stems from a use-after-free memory bug. Authenticated attackers can exploit it using a specially crafted Lua script, a feature that is enabled by default. Researchers at Wiz, who discovered and reported the bug at Pwn2Own Berlin, have dubbed it \"RediShell.\"\u003C/p>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small block-quote--has-author\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">This provides an attacker with full access to the host system, allowing them to exfiltrate, delete, or encrypt sensitive data, hijack resources, and move laterally in cloud environments.\u003C/div>\u003Cdiv class=\"block-quote__author\">Wiz Researchers\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Impact of a Successful Exploit\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">A successful exploit allows an attacker to escape the Lua sandbox and achieve RCE on the target Redis host. Once compromised, a hacker can:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">Steal credentials and sensitive information stored in Redis.\u003C/li>\u003Cli class=\"content-block-list-item\">Deploy malware, ransomware, or cryptocurrency mining tools.\u003C/li>\u003Cli class=\"content-block-list-item\">Establish a reverse shell for persistent access.\u003C/li>\u003Cli class=\"content-block-list-item\">Move laterally to attack other systems on the victim's network.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Mitigation and Protection\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">While the exploit requires authentication, researchers found approximately 330,000 Redis instances exposed online, with at least \u003Cb>60,000 of them requiring no authentication at all\u003C/b>. Both Redis and Wiz strongly urge administrators to update their instances immediately, prioritizing those exposed to the internet.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">For additional defense, administrators should also implement the following security best practices:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">Enable strong authentication.\u003C/li>\u003Cli class=\"content-block-list-item\">Disable Lua scripting and other non-essential commands.\u003C/li>\u003Cli class=\"content-block-list-item\">Run Redis with a non-root user account.\u003C/li>\u003Cli class=\"content-block-list-item\">Implement robust logging and monitoring.\u003C/li>\u003Cli class=\"content-block-list-item\">Restrict network access to authorized networks using firewalls and VPCs.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">A History of Redis Exploits\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Unprotected Redis instances are a frequent target for botnets. In June 2024, the P2PInfect botnet was observed installing Monero cryptominers and deploying a ransomware module on unpatched, internet-facing servers. Other notable malware campaigns targeting Redis include Redigo, HeadCrab, and Migo, all of which hijacked resources for cryptocurrency mining.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/news\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#news\u003C/a> \u003Ca href=\"/tag/security\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#security\u003C/a> \u003Ca href=\"/tag/redis\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#redis\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":1135,"blocks":1136,"version":67},1760001678527,[1137,1141,1146,1150,1154,1158,1163,1167,1171,1192,1196,1200,1204,1229,1233,1237],{"id":1138,"type":14,"data":1139},"aB3cD8xWzG",{"text":1140},"The Redis security team has \u003Ca href=\"https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/\">released patches\u003C/a> for a maximum-severity vulnerability that could allow attackers to achieve remote code execution (RCE) on thousands of instances. Incredibly, the flaw has been present in the project's codebase for 13 years.",{"id":1142,"type":105,"data":1143},"kL5mN1jPqE",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":1144},{"url":1145},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/baf91f4f-bf3b-4ed7-a4b2-7464abe2ae8a/1184.webp",{"id":1147,"type":23,"data":1148},"hY7zX4vBcF",{"text":1149,"level":26},"Understanding the 'RediShell' Vulnerability",{"id":1151,"type":14,"data":1152},"sT2uV9wRzJ",{"text":1153},"Redis (Remote Dictionary Server) is a popular open-source, in-memory data structure store used as a database, cache, and message broker in approximately 75% of cloud environments. Its primary advantage is providing ultra-fast data access by storing data in RAM.",{"id":1155,"type":14,"data":1156},"oI8pA6sDqW",{"text":1157},"Tracked as \u003Ca href=\"https://nvd.nist.gov/vuln/detail/CVE-2025-49844\">CVE-2025-49844,\u003C/a> the vulnerability stems from a use-after-free memory bug. Authenticated attackers can exploit it using a specially crafted Lua script, a feature that is enabled by default. Researchers at Wiz, who discovered and reported the bug at Pwn2Own Berlin, have dubbed it \"RediShell.\"",{"id":1159,"type":112,"data":1160},"mE1xN7zYvK",{"quoteText":1161,"authorText":1162},"This provides an attacker with full access to the host system, allowing them to exfiltrate, delete, or encrypt sensitive data, hijack resources, and move laterally in cloud environments.","Wiz Researchers",{"id":1164,"type":23,"data":1165},"gC3vB5uTzH",{"text":1166,"level":26},"Impact of a Successful Exploit",{"id":1168,"type":14,"data":1169},"uR9iO4lPqV",{"text":1170},"A successful exploit allows an attacker to escape the Lua sandbox and achieve RCE on the target Redis host. Once compromised, a hacker can:",{"id":1172,"type":38,"data":1173},"yK6jM2hNfD",{"style":40,"meta":1174,"items":1175},{},[1176,1180,1184,1188],{"content":1177,"meta":1178,"items":1179},"Steal credentials and sensitive information stored in Redis.",{},[],{"content":1181,"meta":1182,"items":1183},"Deploy malware, ransomware, or cryptocurrency mining tools.",{},[],{"content":1185,"meta":1186,"items":1187},"Establish a reverse shell for persistent access.",{},[],{"content":1189,"meta":1190,"items":1191},"Move laterally to attack other systems on the victim's network.",{},[],{"id":1193,"type":23,"data":1194},"wZ4xV8bSgA",{"text":1195,"level":26},"Mitigation and Protection",{"id":1197,"type":14,"data":1198},"fB1dN6zYvL",{"text":1199},"While the exploit requires authentication, researchers found approximately 330,000 Redis instances exposed online, with at least \u003Cb>60,000 of them requiring no authentication at all\u003C/b>. Both Redis and Wiz strongly urge administrators to update their instances immediately, prioritizing those exposed to the internet.",{"id":1201,"type":14,"data":1202},"jM7qP3kLgE",{"text":1203},"For additional defense, administrators should also implement the following security best practices:",{"id":1205,"type":38,"data":1206},"lO9rA5sDqX",{"style":40,"meta":1207,"items":1208},{},[1209,1213,1217,1221,1225],{"content":1210,"meta":1211,"items":1212},"Enable strong authentication.",{},[],{"content":1214,"meta":1215,"items":1216},"Disable Lua scripting and other non-essential commands.",{},[],{"content":1218,"meta":1219,"items":1220},"Run Redis with a non-root user account.",{},[],{"content":1222,"meta":1223,"items":1224},"Implement robust logging and monitoring.",{},[],{"content":1226,"meta":1227,"items":1228},"Restrict network access to authorized networks using firewalls and VPCs.",{},[],{"id":1230,"type":23,"data":1231},"nC2vB5uTzI",{"text":1232,"level":26},"A History of Redis Exploits",{"id":1234,"type":14,"data":1235},"pI8qA6sDqZ",{"text":1236},"Unprotected Redis instances are a frequent target for botnets. In June 2024, the P2PInfect botnet was observed installing Monero cryptominers and deploying a ransomware module on unpatched, internet-facing servers. Other notable malware campaigns targeting Redis include Redigo, HeadCrab, and Migo, all of which hijacked resources for cryptocurrency mining.",{"id":1238,"type":14,"data":1239},"rE1xN7zYvM",{"text":1240},"#news #security #redis",{"authorId":1242,"name":1243,"avatar":1244,"username":1245},"ANx5bAorkDSfIPu4rPRs8XHqTaW2","Austin Dunn","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/e486133f-aff5-44bc-ba39-dc0000351764/1184.webp","id616693414223","SECURITY",[1248],{"emojiId":1249,"count":86,"reactedByUser":76},9,{"comments":81,"favorites":82,"views":169,"hits":1251},108,"2025-10-09T09:20:24.961","2025-10-09T09:21:32.076",{"postId":5,"title":6,"slug":70,"preview":7,"html":8,"content":1255,"author":1286,"authorUsername":75,"topic":77,"status":83,"reactions":1287,"counters":1289,"createdAt":68,"updatedAt":69,"publishedPostId":88,"favorite":76},{"time":10,"blocks":1256,"version":67},[1257,1259,1261,1263,1265,1267,1280,1282,1284],{"id":13,"type":14,"data":1258},{"text":16},{"id":18,"type":14,"data":1260},{"text":20},{"id":22,"type":23,"data":1262},{"text":25,"level":26},{"id":28,"type":14,"data":1264},{"text":30},{"id":32,"type":33,"data":1266},{"code":35},{"id":37,"type":38,"data":1268},{"style":40,"meta":1269,"items":1270},{},[1271,1274,1277],{"content":44,"meta":1272,"items":1273},{},[],{"content":48,"meta":1275,"items":1276},{},[],{"content":52,"meta":1278,"items":1279},{},[],{"id":56,"type":23,"data":1281},{"text":58,"level":26},{"id":60,"type":14,"data":1283},{"text":62},{"id":64,"type":14,"data":1285},{"text":66},{"authorId":72,"name":73,"avatar":74,"username":75},[1288],{"emojiId":86,"count":82,"reactedByUser":76},{"comments":81,"favorites":82,"views":79,"hits":80},{"postId":1291,"title":1292,"slug":1293,"preview":1294,"html":1295,"content":1296,"author":1375,"authorUsername":1379,"topic":1380,"status":83,"reactions":1381,"counters":1385,"createdAt":1387,"updatedAt":1388,"publishedPostId":88,"favorite":76},"a0fc9595-bf44-4aee-8a57-80574284cc7b","Tiny Asteroid Skims Past Earth, Closer Than the ISS","556125-tiny-asteroid-skims-past-earth-closer-than-iss","\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">A small asteroid, designated 2025 TF, recently made an exceptionally close fly-by of Earth, passing closer than most orbiting satellites. On October 1st, the object skimmed just 426 kilometers above Antarctica—an altitude comparable to that of the International Space Station.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/ac67282c-eedc-4665-aa8d-ea90ac2635ca/1184.webp\" alt=\"This diagram shows how close asteroid 2025 TQ2 came to Earth. Image source: NASA\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">This diagram shows how close asteroid 2025 TQ2 came to Earth. Image source: NASA\u003C/span>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">A small asteroid, designated 2025 TF, recently made an exceptionally close fly-by of Earth, passing closer than most orbiting satellites. On October 1st, the object skimmed just 426 kilometers above Antarctica—an altitude comparable to that of the International Space Station.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/ac67282c-eedc-4665-aa8d-ea90ac2635ca/1184.webp\" alt=\"This diagram shows how close asteroid 2025 TQ2 came to Earth. Image source: NASA\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">This diagram shows how close asteroid 2025 TQ2 came to Earth. Image source: NASA\u003C/span>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">A Late Discovery\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Remarkably, astronomers only spotted the asteroid hours after its closest approach. It was first logged by the Catalina Sky Survey, with the European Space Agency (ESA) later confirming the near-miss using the Las Cumbres Observatory network in Australia, \u003Ca href=\"https://abcnews.go.com/US/asteroid-flew-closer-earth-satellites-space-agencies/story?id=126289953\">reports ABC News\u003C/a>.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>Size:\u003C/b> Estimated to be between 1 and 3 meters in diameter.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Potential Impact:\u003C/b> Had it entered the atmosphere, it would have likely created a brilliant fireball (a bolide), with any surviving fragments landing as meteorites.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Next Visit:\u003C/b> NASA data indicates its next close approach won't be until April 2087.\u003C/li>\u003C/ul>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small block-quote--has-author\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">Detecting a meter-sized object in the vast darkness of space, when its location is not yet precisely known, is an impressive achievement.\u003C/div>\u003Cdiv class=\"block-quote__author\">European Space Agency (ESA)\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--default\">\u003Chr class=\"block-content content-block-delimiter\">\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch2 class=\"block-content\">A Busy Week for Asteroid Spotting\u003C/h2>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">This event was not an isolated one. Just a day later, on October 2nd, another small asteroid named 2025 TQ2 flew past Earth over Canada at a distance of about 4,850 kilometers, as reported by \u003Ca href=\"https://earthsky.org/space/2-asteroids-safely-buzzed-earth-sep-oct-2025/\">EarthSky\u003C/a>.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">While agencies track thousands of near-Earth objects, most are not considered dangerous. According to NASA's Center for Near-Earth Object Studies, an asteroid is only classified as \"potentially hazardous\" if it meets specific criteria:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">Its diameter is greater than 152 meters.\u003C/li>\u003Cli class=\"content-block-list-item\">Its orbit brings it within 7.5 million kilometers of Earth.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">To put these close passes in perspective, NASA reported that 10 different asteroids flew by at a distance closer than the Moon in just one week, from September 23rd to 28th.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/space\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#space\u003C/a> \u003Ca href=\"/tag/asteroid\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#asteroid\u003C/a> \u003Ca href=\"/tag/nasa\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#nasa\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":1297,"blocks":1298,"version":67},1760000317932,[1299,1303,1309,1313,1317,1334,1339,1342,1346,1350,1354,1367,1371],{"id":1300,"type":14,"data":1301},"hB3sVgFpT1",{"text":1302},"A small asteroid, designated 2025 TF, recently made an exceptionally close fly-by of Earth, passing closer than most orbiting satellites. On October 1st, the object skimmed just 426 kilometers above Antarctica—an altitude comparable to that of the International Space Station.",{"id":1304,"type":105,"data":1305},"eDe9a5Eb-1",{"caption":1306,"withBorder":76,"withBackground":76,"stretched":76,"file":1307},"This diagram shows how close asteroid 2025 TQ2 came to Earth. Image source: NASA",{"url":1308},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/ac67282c-eedc-4665-aa8d-ea90ac2635ca/1184.webp",{"id":1310,"type":23,"data":1311},"kLpQmRzS2b",{"text":1312,"level":26},"A Late Discovery",{"id":1314,"type":14,"data":1315},"sVgFpT1hB3",{"text":1316},"Remarkably, astronomers only spotted the asteroid hours after its closest approach. It was first logged by the Catalina Sky Survey, with the European Space Agency (ESA) later confirming the near-miss using the Las Cumbres Observatory network in Australia, \u003Ca href=\"https://abcnews.go.com/US/asteroid-flew-closer-earth-satellites-space-agencies/story?id=126289953\">reports ABC News\u003C/a>.",{"id":1318,"type":38,"data":1319},"pRzS2bkLpQ",{"style":40,"meta":1320,"items":1321},{},[1322,1326,1330],{"content":1323,"meta":1324,"items":1325},"\u003Cb>Size:\u003C/b> Estimated to be between 1 and 3 meters in diameter.",{},[],{"content":1327,"meta":1328,"items":1329},"\u003Cb>Potential Impact:\u003C/b> Had it entered the atmosphere, it would have likely created a brilliant fireball (a bolide), with any surviving fragments landing as meteorites.",{},[],{"content":1331,"meta":1332,"items":1333},"\u003Cb>Next Visit:\u003C/b> NASA data indicates its next close approach won't be until April 2087.",{},[],{"id":1335,"type":112,"data":1336},"fPt1hB3sVg",{"quoteText":1337,"authorText":1338},"Detecting a meter-sized object in the vast darkness of space, when its location is not yet precisely known, is an impressive achievement.","European Space Agency (ESA)",{"id":1340,"type":147,"data":1341},"mRzS2bkLpQ",{},{"id":1343,"type":23,"data":1344},"qM2rN3oP4j",{"text":1345,"level":82},"A Busy Week for Asteroid Spotting",{"id":1347,"type":14,"data":1348},"t1hB3sVgFp",{"text":1349},"This event was not an isolated one. Just a day later, on October 2nd, another small asteroid named 2025 TQ2 flew past Earth over Canada at a distance of about 4,850 kilometers, as reported by \u003Ca href=\"https://earthsky.org/space/2-asteroids-safely-buzzed-earth-sep-oct-2025/\">EarthSky\u003C/a>.",{"id":1351,"type":14,"data":1352},"oP4jqM2rN3",{"text":1353},"While agencies track thousands of near-Earth objects, most are not considered dangerous. According to NASA's Center for Near-Earth Object Studies, an asteroid is only classified as \"potentially hazardous\" if it meets specific criteria:",{"id":1355,"type":38,"data":1356},"rN3oP4jqM2",{"style":40,"meta":1357,"items":1358},{},[1359,1363],{"content":1360,"meta":1361,"items":1362},"Its diameter is greater than 152 meters.",{},[],{"content":1364,"meta":1365,"items":1366},"Its orbit brings it within 7.5 million kilometers of Earth.",{},[],{"id":1368,"type":14,"data":1369},"hB3sVgFt1p",{"text":1370},"To put these close passes in perspective, NASA reported that 10 different asteroids flew by at a distance closer than the Moon in just one week, from September 23rd to 28th.",{"id":1372,"type":14,"data":1373},"kTamszmPJF",{"text":1374},"#space #asteroid #nasa",{"authorId":1376,"name":1377,"avatar":1378,"username":1379},"QjGvJPj3MAbtvPxlnbYS4x6pgSJ2","Sigfried Kallert","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/32e27897-daf9-4739-be62-08015581813b/1184.webp","id480574037638","SPACE",[1382,1384],{"emojiId":1383,"count":86,"reactedByUser":76},17,{"emojiId":1249,"count":86,"reactedByUser":76},{"comments":81,"favorites":82,"views":1124,"hits":1386},153,"2025-10-09T07:25:51.875","2025-10-09T10:22:56.901",{"postId":1390,"title":1391,"slug":1392,"preview":1393,"html":1394,"content":1395,"author":1491,"authorUsername":1495,"topic":1496,"status":83,"reactions":1497,"counters":1500,"createdAt":1502,"updatedAt":1503,"publishedPostId":88,"favorite":76},"0d5aee03-4315-495a-b20d-b2e9b19474fa","Amazon introduces vending machines with prescription drugs into One Medical clinics","545392-amazon-vending-machines-prescription-drugs-one-medical","\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/4f26ac23-6fa5-4ba6-9bd0-f4da1661afa0/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Amazon is \u003Ca href=\"https://www.aboutamazon.com/news/retail/amazon-pharmacy-kiosks-one-medical\">installing\u003C/a> pharmacy kiosks in One Medical clinics, allowing patients to pick up their prescriptions immediately after an appointment. The initiative aims to streamline access to essential medications and will begin rolling out in Los Angeles in December 2025 before expanding to other locations.\u003C/p>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/4f26ac23-6fa5-4ba6-9bd0-f4da1661afa0/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch2 class=\"block-content\">Amazon to Launch Prescription Vending Machines in Medical Clinics\u003C/h2>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Amazon is \u003Ca href=\"https://www.aboutamazon.com/news/retail/amazon-pharmacy-kiosks-one-medical\">installing\u003C/a> pharmacy kiosks in One Medical clinics, allowing patients to pick up their prescriptions immediately after an appointment. The initiative aims to streamline access to essential medications and will begin rolling out in Los Angeles in December 2025 before expanding to other locations.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">How It Works\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Col class=\"block-content content-block-list-ordered\">\u003Cli class=\"content-block-list-item\">A doctor sends the prescription to Amazon Pharmacy following a patient's appointment.\u003C/li>\u003Cli class=\"content-block-list-item\">The patient places their order through the Amazon app.\u003C/li>\u003Cli class=\"content-block-list-item\">The patient receives a unique QR code to scan at the clinic's kiosk.\u003C/li>\u003Cli class=\"content-block-list-item\">The kiosk dispenses the medication instantly.\u003C/li>\u003C/ol>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/0a26a71a-f62e-4638-bf8a-1bf9d60d4663/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">Available Medications\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">Each kiosk will be stocked with a curated selection of the most commonly prescribed medications for that specific clinic, such as:\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">Antibiotics\u003C/li>\u003Cli class=\"content-block-list-item\">Inhalers\u003C/li>\u003Cli class=\"content-block-list-item\">Medications for high blood pressure\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">For safety and logistical reasons, the kiosks will not dispense controlled substances or medications that require refrigeration.\u003C/p>\u003C/div>\u003Cfigure class=\"block-wrapper block-wrapper--media\">\u003Cdiv class=\"block-wrapper__content\">\u003Cblockquote class=\"block-quote block-quote--text-small block-quote--has-author\">\u003Cdiv class=\"block-quote__line\">\u003C/div>\u003Cdiv class=\"block-quote__text\">When patients have to make an extra trip to a pharmacy after their doctor's visit, many prescriptions go unfilled. By bringing the pharmacy directly to the point of care, we're removing a significant barrier and helping patients start their treatment right when they need it—immediately.\u003C/div>\u003Cdiv class=\"block-quote__author\">Amazon Pharmacy\u003C/div>\u003C/blockquote>\u003C/div>\u003C/figure>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cimg src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/7f9eacec-c1fb-400e-81bc-e30538e0b64f/1184.webp\" alt=\"Image\" class=\"rounded-xl medium-zoom-image\" loading=\"lazy\">\u003C/figure>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">A Shifting Pharmacy Landscape\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">This move by Amazon comes as traditional U.S. pharmacies face intense competition and financial pressure. According to \u003Ca href=\"https://www.theverge.com/news/796076/amazon-pharmacy-prescription-drug-vending-machine-kiosks\">The Verge\u003C/a>, recent closures of major chains like Rite Aid, CVS, and Walgreens have created gaps in access to prescription services for many communities, a void that Amazon's new model may help to fill.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/news\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#news\u003C/a> \u003Ca href=\"/tag/amazon\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#amazon\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":1396,"blocks":1397,"version":67},1759989978186,[1398,1403,1407,1411,1414,1435,1440,1444,1448,1465,1469,1474,1479,1483,1487],{"id":1399,"type":105,"data":1400},"2d8f9c1a-0",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":1401},{"url":1402},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/4f26ac23-6fa5-4ba6-9bd0-f4da1661afa0/1184.webp",{"id":1404,"type":23,"data":1405},"e3a1b2c3-d",{"text":1406,"level":82},"Amazon to Launch Prescription Vending Machines in Medical Clinics",{"id":1408,"type":14,"data":1409},"4f5g6h7i-j",{"text":1410},"Amazon is \u003Ca href=\"https://www.aboutamazon.com/news/retail/amazon-pharmacy-kiosks-one-medical\">installing\u003C/a> pharmacy kiosks in One Medical clinics, allowing patients to pick up their prescriptions immediately after an appointment. The initiative aims to streamline access to essential medications and will begin rolling out in Los Angeles in December 2025 before expanding to other locations.",{"id":1412,"type":23,"data":1413},"k8l9m0n1-o",{"text":25,"level":26},{"id":1415,"type":38,"data":1416},"p2q3r4s5-t",{"style":1087,"meta":1417,"items":1418},{"counterType":1089},[1419,1423,1427,1431],{"content":1420,"meta":1421,"items":1422},"A doctor sends the prescription to Amazon Pharmacy following a patient's appointment.",{},[],{"content":1424,"meta":1425,"items":1426},"The patient places their order through the Amazon app.",{},[],{"content":1428,"meta":1429,"items":1430},"The patient receives a unique QR code to scan at the clinic's kiosk.",{},[],{"content":1432,"meta":1433,"items":1434},"The kiosk dispenses the medication instantly.",{},[],{"id":1436,"type":105,"data":1437},"b7c8d9e0-f",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":1438},{"url":1439},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/0a26a71a-f62e-4638-bf8a-1bf9d60d4663/1184.webp",{"id":1441,"type":23,"data":1442},"u6v7w8x9-y",{"text":1443,"level":26},"Available Medications",{"id":1445,"type":14,"data":1446},"z0a1b2c3-d",{"text":1447},"Each kiosk will be stocked with a curated selection of the most commonly prescribed medications for that specific clinic, such as:",{"id":1449,"type":38,"data":1450},"e4f5g6h7-i",{"style":40,"meta":1451,"items":1452},{},[1453,1457,1461],{"content":1454,"meta":1455,"items":1456},"Antibiotics",{},[],{"content":1458,"meta":1459,"items":1460},"Inhalers",{},[],{"content":1462,"meta":1463,"items":1464},"Medications for high blood pressure",{},[],{"id":1466,"type":14,"data":1467},"j8k9l0m1-n",{"text":1468},"For safety and logistical reasons, the kiosks will not dispense controlled substances or medications that require refrigeration.",{"id":1470,"type":112,"data":1471},"o2p3q4r5-s",{"quoteText":1472,"authorText":1473},"When patients have to make an extra trip to a pharmacy after their doctor's visit, many prescriptions go unfilled. By bringing the pharmacy directly to the point of care, we're removing a significant barrier and helping patients start their treatment right when they need it—immediately.","Amazon Pharmacy",{"id":1475,"type":105,"data":1476},"t6u7v8w9-x",{"caption":107,"withBorder":76,"withBackground":76,"stretched":76,"file":1477},{"url":1478},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/7f9eacec-c1fb-400e-81bc-e30538e0b64f/1184.webp",{"id":1480,"type":23,"data":1481},"y0z1a2b3-c",{"text":1482,"level":26},"A Shifting Pharmacy Landscape",{"id":1484,"type":14,"data":1485},"d4e5f6g7-h",{"text":1486},"This move by Amazon comes as traditional U.S. pharmacies face intense competition and financial pressure. According to \u003Ca href=\"https://www.theverge.com/news/796076/amazon-pharmacy-prescription-drug-vending-machine-kiosks\">The Verge\u003C/a>, recent closures of major chains like Rite Aid, CVS, and Walgreens have created gaps in access to prescription services for many communities, a void that Amazon's new model may help to fill.",{"id":1488,"type":14,"data":1489},"CX4jEnTzat",{"text":1490},"#news #amazon",{"authorId":1492,"name":1493,"avatar":1494,"username":1495},"zxw3MpApVqaPjrvkcWdqkj7Pbyl2","Stian Mikkelsen","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/4aa636c9-d864-4555-8dc2-7e8a24f2584b/1184.webp","id979945595542","SERVICES",[1498,1499],{"emojiId":86,"count":86,"reactedByUser":76},{"emojiId":307,"count":86,"reactedByUser":76},{"comments":81,"favorites":82,"views":169,"hits":1501},237,"2025-10-09T06:04:10.138","2025-10-09T08:21:08.311",{"postId":1505,"title":1506,"slug":1507,"preview":1508,"html":1509,"content":1510,"author":1568,"authorUsername":1572,"topic":77,"status":83,"reactions":1573,"counters":1577,"createdAt":1580,"updatedAt":1581,"publishedPostId":88,"favorite":76},"e440ef16-570c-41f9-9b4e-724dc7fd3369","xAI updates Grok Imagine model — now it generates video with character speech and in better quality","044673-xai-updates-grok-imagine-model-generates-video-with-character-speech-better-quality","\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The latest version of the AI video generation model is now available for free on the \u003Ca href=\"https://grok.com/imagine\">Grok website\u003C/a> and its mobile apps for \u003Ca href=\"https://apps.apple.com/us/app/grok-%D0%B8%D0%B8-%D0%B0%D1%81%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BD%D1%82/id6670324846?l=ru\">iOS\u003C/a> and \u003Ca href=\"https://play.google.com/store/apps/details?id=ai.x.grok&hl=ru\">Android\u003C/a>. Following its initial release, this update introduces significant new features and enhancements.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cvideo src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/8f1bc349-f77d-478f-9ef4-c3c4b04fb90c/a9a961fe-28d5-4f8a-95c7-1efc17409e6817902429029080188759.mp4\" class=\"rounded-xl w-full\" preload=\"auto\" autoplay muted playsinline loop>Your browser does not support the video tag.\u003C/video>\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">Example of a video generated with background music.\u003C/span>\u003C/div>","\u003Cdiv class=\"content-wrapper break-words\">\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">The latest version of the AI video generation model is now available for free on the \u003Ca href=\"https://grok.com/imagine\">Grok website\u003C/a> and its mobile apps for \u003Ca href=\"https://apps.apple.com/us/app/grok-%D0%B8%D0%B8-%D0%B0%D1%81%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BD%D1%82/id6670324846?l=ru\">iOS\u003C/a> and \u003Ca href=\"https://play.google.com/store/apps/details?id=ai.x.grok&hl=ru\">Android\u003C/a>. Following its initial release, this update introduces significant new features and enhancements.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cvideo src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/8f1bc349-f77d-478f-9ef4-c3c4b04fb90c/a9a961fe-28d5-4f8a-95c7-1efc17409e6817902429029080188759.mp4\" class=\"rounded-xl w-full\" preload=\"auto\" autoplay muted playsinline loop>Your browser does not support the video tag.\u003C/video>\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">Example of a video generated with background music.\u003C/span>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">What's New in Grok Imagine v0.9?\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cul class=\"block-content content-block-list-unordered\">\u003Cli class=\"content-block-list-item\">\u003Cb>New 'Speech' Mode:\u003C/b> Users can now make characters speak by providing text. This joins the existing Custom, Fun, and Spicy modes, the latter of which allows for videos with partial nudity and suggestive movements.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Longer Videos:\u003C/b> The model can now generate videos up to six seconds in length.\u003C/li>\u003Cli class=\"content-block-list-item\">\u003Cb>Rapid Quality Improvement:\u003C/b> Social media users are highlighting the dramatic improvement in quality since the model's initial release in early August 2025.\u003C/li>\u003C/ul>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cvideo src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/d47ab55a-bef1-44a9-a44d-86548d75b623/529195dc-becf-4f88-852b-e36161ad91705079340660026946751.mp4\" class=\"rounded-xl w-full\" preload=\"auto\" autoplay muted playsinline loop>Your browser does not support the video tag.\u003C/video>\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">Grok Imagine v0.9 generating speech for an actress from a source image. \u003C/span>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Ch3 class=\"block-content\">A Look Back: The Previous Version\u003C/h3>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">For comparison, the previous version of the model lacked the ability to add speech to characters, which underscores the significant progress made in this latest update.\u003C/p>\u003C/div>\u003Cdiv class=\"block-wrapper--media\">\u003Cfigure class=\"block-content content-block-image\">\u003Cvideo src=\"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/b5f29c3f-b136-460a-bdad-82afad4af272/5fff7419-9b4a-4f16-8628-6afa1357708217328938417345182533.mp4\" class=\"rounded-xl w-full\" preload=\"auto\" autoplay muted playsinline loop>Your browser does not support the video tag.\u003C/video>\u003C/figure>\u003Cspan class=\"caption-text text-sm mt-3\">An example from the previous version of Grok Imagine. \u003C/span>\u003C/div>\u003Cdiv class=\"block-wrapper--default\">\u003Cp class=\"block-content\">\u003Ca href=\"/tag/news\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#news\u003C/a> \u003Ca href=\"/tag/ai\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#ai\u003C/a> \u003Ca href=\"/tag/grok\" target=\"_blank\" rel=\"noopener noreferrer ugc\">#grok\u003C/a>\u003C/p>\u003C/div>\u003C/div>",{"time":1511,"blocks":1512,"version":67},1759837665107,[1513,1517,1523,1527,1544,1550,1554,1558,1564],{"id":1514,"type":14,"data":1515},"xY8rP5tQz7",{"text":1516},"The latest version of the AI video generation model is now available for free on the \u003Ca href=\"https://grok.com/imagine\">Grok website\u003C/a> and its mobile apps for \u003Ca href=\"https://apps.apple.com/us/app/grok-%D0%B8%D0%B8-%D0%B0%D1%81%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BD%D1%82/id6670324846?l=ru\">iOS\u003C/a> and \u003Ca href=\"https://play.google.com/store/apps/details?id=ai.x.grok&hl=ru\">Android\u003C/a>. Following its initial release, this update introduces significant new features and enhancements.",{"id":1518,"type":105,"data":1519},"a9bC1dF4gH",{"caption":1520,"withBorder":76,"withBackground":76,"stretched":76,"file":1521},"Example of a video generated with background music.",{"url":1522},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/8f1bc349-f77d-478f-9ef4-c3c4b04fb90c/a9a961fe-28d5-4f8a-95c7-1efc17409e6817902429029080188759.mp4",{"id":1524,"type":23,"data":1525},"kL5mN8jPq2",{"text":1526,"level":26},"What's New in Grok Imagine v0.9?",{"id":1528,"type":38,"data":1529},"rS9tV3wXz6",{"style":40,"meta":1530,"items":1531},{},[1532,1536,1540],{"content":1533,"meta":1534,"items":1535},"\u003Cb>New 'Speech' Mode:\u003C/b> Users can now make characters speak by providing text. This joins the existing Custom, Fun, and Spicy modes, the latter of which allows for videos with partial nudity and suggestive movements.",{},[],{"content":1537,"meta":1538,"items":1539},"\u003Cb>Longer Videos:\u003C/b> The model can now generate videos up to six seconds in length.",{},[],{"content":1541,"meta":1542,"items":1543},"\u003Cb>Rapid Quality Improvement:\u003C/b> Social media users are highlighting the dramatic improvement in quality since the model's initial release in early August 2025.",{},[],{"id":1545,"type":105,"data":1546},"vC7xZ1bNf8",{"caption":1547,"withBorder":76,"withBackground":76,"stretched":76,"file":1548},"Grok Imagine v0.9 generating speech for an actress from a source image. ",{"url":1549},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/d47ab55a-bef1-44a9-a44d-86548d75b623/529195dc-becf-4f88-852b-e36161ad91705079340660026946751.mp4",{"id":1551,"type":23,"data":1552},"iN6jO0kRz9",{"text":1553,"level":26},"A Look Back: The Previous Version",{"id":1555,"type":14,"data":1556},"wD3zF7gVb2",{"text":1557},"For comparison, the previous version of the model lacked the ability to add speech to characters, which underscores the significant progress made in this latest update.",{"id":1559,"type":105,"data":1560},"qA5xS8tUj6",{"caption":1561,"withBorder":76,"withBackground":76,"stretched":76,"file":1562},"An example from the previous version of Grok Imagine. ",{"url":1563},"https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/b5f29c3f-b136-460a-bdad-82afad4af272/5fff7419-9b4a-4f16-8628-6afa1357708217328938417345182533.mp4",{"id":1565,"type":14,"data":1566},"bWBzEUpW5k",{"text":1567},"#news #ai #grok",{"authorId":1569,"name":1570,"avatar":1571,"username":1572},"js9nOXdaWKhIGloRqskbZDY1WnL2","Leonid Herasimau","https://media.suddo.io/file/2f3af38f-ffaf-465d-b6b8-b927250a64dc/60fdf5c8-13ea-41de-b2e9-566870b67fc2/592.webp","id357938428487",[1574,1575,1576],{"emojiId":1383,"count":86,"reactedByUser":76},{"emojiId":307,"count":86,"reactedByUser":76},{"emojiId":311,"count":82,"reactedByUser":76},{"comments":82,"favorites":307,"views":1578,"hits":1579},239,414,"2025-10-07T11:41:52.745","2025-10-09T08:21:12.902",["Reactive",1583],{"$si18n:cached-locale-configs":1584,"$si18n:resolved-locale":107,"$sshowLoginModal":76},{},["Set"],["ShallowReactive",1587],{"post-ai-684079-google-challenges-openai-with-gemini-cli-extensions":-1,"post-slug-ai-684079-google-challenges-openai-with-gemini-cli-extensions":-1,"feed-global-none-none-hot-none-0":-1},true,"/ai/684079-google-challenges-openai-with-gemini-cli-extensions",{"auth":1591,"app":1592,"theme":1593,"main":1681,"i18n":1683,"ui":1687},{"logged":76,"user":88,"authReady":76},{"lastUpdatedPostId":88,"lastUpdateTime":88},{"layout":1594,"themeName":1595,"routerTransition":1596,"routerTransitionDuration":81,"rtl":76,"boxed":1597,"sidebar":1599,"footer":1605,"responsive":1606,"toolbarHeight":1612,"viewPadding":1610,"headerBarHeight":1614,"colors":1615,"borderRadius":1643,"lineHeight":1646,"fontSize":1648,"fontWeight":1651,"fontFamily":1654,"typography":1656},"VerticalNav","light","fade-up",{"enabled":1588,"toolbar":1588,"width":1598},1600,{"autoClose":1588,"collapsed":76,"autoCloseBreakpoint":1600,"animEase":1601,"animDuration":1602,"openWidth":1603,"closeWidth":1604},1000,"ease-in-out",0.3,300,64,{"show":1588},{"breakpoint":1607,"override":1608},700,{"viewPadding":1609,"toolbarHeight":1611},{"desk":1610,"mobile":79},40,{"desk":1612,"mobile":1613},80,70,60,{"light":1616,"dark":1631},{"sidebarBackground":1617,"bodyBackground":1618,"background":1617,"backgroundSecondary":1619,"text":1620,"textSecondary":1621,"textTertiary":1622,"border":1623,"hover":1624,"primary":1625,"info":1626,"success":1627,"warning":1628,"error":1629,"extra1":1626,"extra2":1630,"extra3":1628,"extra4":1629},"rgb(255, 255, 255)","rgb(245, 247, 249)","#F2F2F2","rgb(0, 0, 0)","#000","rgb(114, 115, 115)","rgb(226, 230, 233)","rgba(221, 224, 225, 0.5)","hsl(221.2, 83.2%, 53.3%)","rgb(97, 102, 255)","rgb(0, 179, 122)","rgb(255, 183, 0)","rgb(255, 0, 85)","rgb(255, 97, 200)",{"sidebarBackground":1632,"bodyBackground":1633,"background":1632,"backgroundSecondary":1634,"text":1635,"textSecondary":1636,"textTertiary":1637,"border":1638,"hover":1639,"primary":1640,"info":1626,"success":1641,"warning":1628,"error":1642,"extra1":1626,"extra2":1630,"extra3":1628,"extra4":1629},"rgb(35, 35, 36)","rgb(22, 22, 23)","rgb(44, 44, 45)","rgb(201, 204, 207)","#c9cccf","rgb(150, 157, 160)","rgb(53, 52, 54)","rgb(58, 58, 58)","rgb(65, 138, 244)","rgb(51, 160, 62)","rgb(214, 51, 62)",{"default":1644,"small":1645},"8px","4px",{"default":1647},"1.25",{"default":1649,"cardTitle":1650},"16px","18px",{"default":1652,"strong":1653,"cardTitle":1653},"400","600",{"default":1655,"display":1655,"mono":1655},"Roboto, system-ui, -apple-system, Segoe UI, Roboto, Ubuntu, Cantarell, Noto Sans, sans-serif",{"h1":1657,"h2":1662,"h3":1665,"h4":1668,"h5":1671,"h6":1674,"p":1678},{"fontFamily":1658,"fontSize":1659,"fontWeight":1660,"lineHeight":1661},"{fontFamily.display}","30px","700","38",{"fontFamily":1658,"fontSize":1663,"fontWeight":1660,"lineHeight":1664},"26px","33",{"fontFamily":1658,"fontSize":1666,"fontWeight":1660,"lineHeight":1667},"22px","28",{"fontFamily":1658,"fontSize":1650,"fontWeight":1669,"lineHeight":1670},"500","23",{"fontFamily":1658,"fontSize":1672,"fontWeight":1660,"lineHeight":1673},"14px","18",{"fontFamily":1675,"fontSize":1676,"fontWeight":1669,"lineHeight":1677},"{fontFamily.default}","12px","15",{"fontFamily":1675,"fontSize":1679,"lineHeight":1680},"{fontSize.default}","20",{"API_URL":-1,"forceRefresh":1682,"loadingBar":88},1760020305716,{"locale":1684,"availableLocales":1686},["Ref",1685],"en",[1685],{"feedRefreshKey":81}]