Blog

  • Creating AI agent solutions for warehouse data access and security

    Creating AI agent solutions for warehouse data access and security

    • In this post, we explore the ways we’re evolving Meta’s data warehouse to facilitate productivity and security to serve both human users and AI agents. 
    • We detail how we’re developing agents that help users making data access requests to get to the data they need, and that help data owners process requests and maintain security. 
    • We share how we’re using guardrails, including auditing and feedback systems, to ensure agents operate within set boundaries and to evaluate the overall process.

    As part of its offline data systems, Meta operates a data warehouse that supports use cases across analytics, ML, and AI. Given the sheer volume of data, the scale of our systems, and the diverse use cases built on top, data warehouse security is very important. Teams across Meta both manage access and use that data in their day-to-day work. As the scale continues to grow and the data access patterns become more complex, the complexity of managing access and the time spent to obtain access keep increasing. How do we minimize security risks and enable teams to operate efficiently? With the rise of GenAI and agents, we needed to rethink how we can enhance security and productivity with agents, making them an integral part of our internal data products, capable of both streamlining data access and minimizing risk. In this post, we will share our work. 

    Background

    In the past, we scaled data access and management by organizing the data warehouse into a hierarchical structure, as shown below in Figure 1. At the leaf of this hierarchy are tables, with pipelines producing them and dashboards consuming them. On-calls manage these assets, followed by teams and organizational hierarchies. Using role-based access control, we further modeled business needs as roles, aligning with this hierarchical structure and other dimensions, such as data semantics. 

    However, with the growth in AI, timely access of data has become increasingly important. As the scale of data warehouses continues to grow and data access patterns become more complex, the complexity and amount of time spent on managing and obtaining access keep increasing. 

    Figure 1: Data warehouse in resource hierarchy

    To understand how we have handled this traditionally, and why that is becoming increasingly challenging, it helps to visualize the data flow through Meta’s offline infrastructure as a graph, as shown in Figure 2 below. Each node in this graph is an asset, such as a table, a column, or a dashboard, and each edge in this graph is an activity. 

    Traditionally, when most of the data analytics was rules-driven, this graph was highly partitioned, and all data-access decisions were local. Engineers who wanted to use the data could discover the data by asking their teammates or looking at other people’s code. On the access-approval front, access could be granted to members of closely related teams. But with the ability of AI systems to process data across different portions of the data graph, such human-driven decisions are becoming challenging.

    Figure 2: Data warehouse as a data graph

    Figure 3 below illustrates that as humans and agents work more frequently across domains, the system complexity increases, both in terms of data scale and the dynamics of access, with AI being a major driver of these complex access patterns. However, we believe AI can also offer solutions to these challenges. With recent advancements in AI, particularly with agents, we’ve needed to evolve our previous approach to an agentic solution for data access. Additionally, while the system was originally designed for humans to operate and to serve both humans and services, we needed to adapt it for agents and humans working together. The new agentic workflow must natively integrate into data products and create a streamlined experience. We also must create strict guardrails, such as analytical rule-based risk assessment, to safeguard the agents.

    Figure 3: Challenges to scale and streamline data access

    User and owner agents

    We modeled the solution as a multi-agent system, as shown in Figure 4 below. Data-user agents assist data users in obtaining access, while data-owner agents help data owners manage access. These two agents also collaborate to streamline the process when both parties are involved. We intentionally separate the two agents to decompose the problem, allowing each to have its own focus.

    Figure 4: How to model the problem for agents to solve

    Look closer at the data-user agent illustrated below in Figure 5. It’s not a monolithic entity; instead, it’s composed of three specialized sub-agents, each focusing on a specific, separate task, and is coordinated by a triage agent.

    Figure 5: Data-user agent

    The first sub-agent suggests alternatives. For instance, when users encounter restricted tables, alternative options are often available, including unrestricted or less-restrictive tables. The agent also assists users in rewriting queries to use only non-restricted columns or in utilizing curated analyses. These insights are often hidden or considered tribal knowledge. Large language models and agents allow us to synthesize this information and guide users at scale.

    The second sub-agent facilitates low-risk data exploration. Typically, users often need access to only a small fraction of a table’s data, especially during the data-exploration phase of analysis workflows. This sub-agent provides context-aware, task-specific data access for low-risk exploration. We will dive deeper into this below.

    The third sub-agent helps users obtain access by crafting permission requests and negotiating with data-owner agents. Currently, we maintain a human-in-the-loop for oversight, but over time, we expect these sub-agents will operate more autonomously.

    The data-owner agent is also composed of several sub-agents, including one for handling security operations and another for assisting with access management, as shown below in Figure 6.

    Figure 6: Data-owner agent

    The first data-owner sub-agent, focused on security operations, acts like a junior engineer who assists the team with security tasks. It follows the SOP (standard operating procedure) provided by the data owner, typically derived from documented rules or guidelines, to handle incoming permission requests.

    The second sub-agent proactively configures access rules for the team. This represents an evolution from the traditional role-mining process, where agents enable us to better utilize semantics and content. 

    Data warehouse for agents

    As we mentioned at the outset, we organized the data warehouse in a hierarchical structure to scale out access. How do we evolve it with the agentic system?

    LLMs communicate through text. The hierarchical structure of the data warehouse provides a convenient way to convert warehouse resources into text, much like a nested folder structure, as depicted in Figure 7 below. Here, organizing units are represented as folders, while leaf nodes such as tables, dashboards, policies, or other entities are represented as resources. This setup gives agents a read-only summarized view of the data warehouse. The SOP we discussed earlier, which documents data-access practices from rules, wikis, and past interactions, becomes a resource that can be represented in text format. It serves as input for both data-user agents to guide users and data-owner agents to manage access.

    Figure 7: Data warehouse as resources

    In addition to organizing inputs for agents to use, another crucial aspect is context management. Here, we differentiate among three scenarios, as shown below in Figure 8. The first scenario is called “automatic context.” Imagine data users discovering data they want to access, only to find their access blocked by controls. The system is aware of who is trying to access what, allowing the agent to fetch the exact context. The second scenario is “static context.” This occurs when users choose to focus on a specific scope explicitly or expand the resource from an automatic context to a broader one. The last scenario is “dynamic context.” It allows agents to further filter resources by metadata, such as data semantics, or via similarity search.

    Figure 8: Context management

    Another key area is intention management. In the context of data access, we often refer to this as  “business needs.” What drives a data user to access certain resources? As shown in Figure 9 below, we model user intention in two ways: explicit and implicit.

    Figure 9: Intention management

    In explicit intention management, users explicitly communicate their intentions to the system. For example, when using certain data tools to access data, they can inform the system of their current task by assuming an associated role, which carries the context of the business needs. This approach captures standard intentions.

    The second is implicit intention. Not every intention can be modeled by roles. That’s where dynamic intention comes in. The system infers intention from a data user’s activities over a short period. For example, if a data user is woken up at midnight to address a pipeline failure, any subsequent data access is likely related to resolving that issue.

    Deep dive: Partial data preview

    Now, let’s dive into how all these elements come together to enable a complete end-to-end use case, which we refer to as partial data preview.

    To quickly recap: In our data-access agentic solution, we have data-user agents that assist data users in obtaining access, and data-owner agents that help data owners manage and operate data access. Typically, a data user’s workflow begins with data discovery, followed by data exploration, before diving into full-fledged data analysis. During the exploration phase, there’s usually interaction with a small amount of data exposure. So, how do we enable more task-specific, context-aware access at this stage of data access?

    To make the system work seamlessly end to end, four key capabilities (illustrated below in Figure 10) are orchestrated by an agentic workflow: 

    • Context. We analyze data-user activities and other information to understand the business needs driving data access and align them with data controls. This enables us to provide task-specific, context-aware control. 
    • Query-level access control at a granular level. We analyze the shape of queries, such as whether they involve aggregation or random sampling. 
    • Data-access budget. Employees are given a data-access budget based on the amount of data they typically access, and this budget, which refreshes daily, is our first line of defense. 
    • Rule-based risk management. We employ rule-based risk control. This defends against attacks against or malfunctions of the AI agent.
    Figure 10: Partial data preview overview

    Figure 11, below, illustrates how the system architecture works: The data-user agent taps into the user-activities tool to gather user activities across various platforms, including diffs, tasks, posts, SEVs, dashboards, and documents. It also uses the user-profile tool to fetch profile information. With this data, the data-user agent formulates the user’s intention based on their activities, profiles, and query shapes, and then calls upon the data-owner agent. The data-owner agent steps in to analyze the query, identifying the resources being accessed. It then fetches metadata related to these resources, such as table summaries, column descriptions, data semantics, and SOPs. The data-owner agent leverages an LLM model to generate the output decision and the reasoning behind it. The output guardrail ensures that the decision aligns with rule-based risk calculations. 

    Figure 11: Partial data preview architecture

    All decisions and logs are securely stored for future reference and analysis. While many of these building blocks might be familiar to some of you—after all, we’ve been working with query analyzers for decades—this is the first time we’re harnessing the language and reasoning capabilities of LLMs to build a multi-agent system for data users and data owners. LLMs have shown potential in this area because business needs are often context- and task-specific, making them difficult to model analytically. LLMs give us the ability to delve into these nuances, while the agents help us construct a dynamic, end-to-end workflow. At the same time, we employ guardrails, such as analytical rule-based risk computation, to ensure that the agents operate within set boundaries. Throughout the decision-making process, we also place a strong emphasis on transparency and tracing.

    Below, Figure 12 shows the evaluation process. Evaluation is one of the most crucial steps in developing an agentic solution. To assess the system’s accuracy, recall, and other performance metrics, we curated an evaluation dataset using real requests. This involved compiling historical requests, collecting user activities and profile information, associating them with query runs, and then using this data for evaluation. We run the evaluation process daily to catch any potential regressions.

    Figure 12: Partial data preview evaluation

    We’ve also developed a data flywheel for the process, as illustrated below in Figure 13. This means that data users’ queries, the agents’ processing traces, the context, and the final outputs are all securely stored for feedback and auditing purposes. Additionally, we’ve created a data tool for data owners, allowing them to view and review decisions and provide us with feedback. This feedback helps us update our evaluations and assess the overall process.

    Figure 13: Partial data preview feedback loop

    What’s ahead?

    There’s still plenty of work ahead of us to become agent-ready. Here are just a few examples. 

    • First, agent collaboration. We’re seeing more and more scenarios where it’s not the users directly accessing data, but rather agents acting on their behalf. How can we support these use cases in the most efficient way?
    • Second, our data warehouse and tools were originally built for employees or services, not agents. How do we continue evolving them to be effectively used by other agents?
    • Lastly, evaluation and benchmarking are important, and we’ll need to keep developing these areas to ensure we stay on track.


    Continue Reading

  • Saudi Arabia Masters: Ronnie O'Sullivan produces comeback to edge past Chang Bingyu – BBC

    Saudi Arabia Masters: Ronnie O'Sullivan produces comeback to edge past Chang Bingyu – BBC

    1. Saudi Arabia Masters: Ronnie O’Sullivan produces comeback to edge past Chang Bingyu  BBC
    2. Saudi Arabia Snooker Masters Day Five: O’Sullivan Storms To 5-0 Win  World Snooker Tour
    3. Ronnie O’Sullivan and Zhao Xintong record speedy whitewash wins to begin Saudi Masters campaigns  Totally Snookered
    4. Ronnie O’Sullivan heaps praise on rival: ‘Like playing Hendry in his prime’  Metro.co.uk
    5. Ronnie O’Sullivan unveils secret weapon as he takes step closer to £500,000 prize  talkSPORT

    Continue Reading

  • Trailforks Puts Trail Maps on Your Wrist With New Apple Watch App

    Trailforks Puts Trail Maps on Your Wrist With New Apple Watch App

    Trailforks today announced the launch of its long-awaited Apple Watch app, giving mountain bikers, trail runners, gravel grinders, moto riders and hikers instant, phone-free access to real-time trail maps and activity stats—directly on their wrist. The new app taps into Trailforks’ unmatched database of global trails and combines seamless navigation with robust health- and performance-tracking to keep users “in the flow” no matter where they ride, run or roam.

    Key features

    • Map-on-wrist navigation – View your exact position on the Trailforks basemap and scope out nearby trailheads and points of interest without pulling out your phone.
    • Offline access – Download detailed offline maps so your adventure continues even when cell service ends.
    • Traildar™ proximity alerts – Receive a gentle buzz or notification as you approach waypoints, intersections or user-defined POIs to stay on course.
    • Multi-activity recording – One-tap start for MTB, moto, ski, gravel, hike, trail run and more, with auto-pause, distance, speed, vert, heart-rate and calorie metrics displayed live.
    • HealthKit integration – Sync every session into Apple Health to close your rings and analyze long-term trends.
    • Trailforks Pro enhancements – Subscribers unlock full offline map layers, Traildar alerts, waypoint creation and breadcrumb trail replay for deeper post-ride analysis.

    Executive quotes

    “You asked—and we listened. Apple Watch is here. Now you can have a true map-on-wrist experience that keeps you locked in on the trail while still tracking every climb, turn, and epic descent,” said Devin Lehman, General Manager of Trailforks.

    “Trailforks has always been about empowering people to explore the outdoors with confidence. Bringing our maps to Apple Watch is another way we’re meeting users where they are—with a unique app that puts the entire Trailforks trail network on an offline map, right on your wrist—making every adventure safer, smarter, and more fun,” said  Trevor May, founder of Trailforks.

    Availability

    The Trailforks Apple Watch app is available today as a free companion download with the latest Trailforks iOS release on the App Store. Basic features are free; advanced capabilities such as offline maps and Traildar are included with Trailforks Pro or Outside+ memberships.

    About Trailforks

    Trailforks is the world’s most comprehensive trail discovery and trail management platform, hosting more than 780,000 user-contributed trails across mountain biking, trail running, moto, ski touring and hiking disciplines. Founded in 2014 and part of the Outside Interactive network, Trailforks empowers millions of adventurers to explore confidently, plan responsibly and give back to the trails they love.

    About Outside Interactive Inc.
    Outside Interactive Inc. – a media and news winner of Fast Company’s Most Innovative Companies 2025– is the premier destination for outdoor inspiration, activation, and celebration. Each year, Outside reaches over 300 million unique users and has over 100 million registered users across its network of 25 media, service, and utility brands, including Outside Magazine, Velo, Yoga Journal, Pinkbike, GaiaGPS, Trailforks, MapMyFitness, athleteReg, and more. Outside’s mission is to get everyone outdoors, experiencing healthy, connected, and fulfilling lives by creating an experience for both longtime adventurers and those just getting started. Outside’s membership offering, Outside+, bundles best-in-class storytelling, videos, gear reviews, mapping apps, online courses, discounted event access, magazines, and more. Learn more at www.OutsideOnline.com.

     

    Trailforks and Traildar are trademarks of Outside Interactive, Inc. Apple Watch and Apple Health are trademarks of Apple Inc.


    Continue Reading

  • Holly Humberstone announces Australian headline shows this November

    Holly Humberstone – Australia Tour 2025
    Presented by Secret Sounds & triple j

    Presales commence Friday 15 August from 11am 
    General Onsale: Monday, August 18 at 11am local time 

    MELBOURNE, AU (August 14, 2025) – Award-winning and critically acclaimed British singer-songwriter Holly Humberstone brings her singular gift for storytelling to Australia this November, headlining a series of headline shows presented by Secret Sounds and triple j. With a voice that carries both confession and catharsis, Holly invites audiences into her world in a way that feels both unguarded and unforgettable.

    She will bring her captivating live show to Melbourne, performing at Max Watt’s on Thursday November 13, followed by The Triffid in Brisbane on Tuesday November 18, before wrapping up the tour at Factory Theatre in Sydney on Sunday November 23.

    An artist presale will commence on Friday August 15 at 11am, running until Monday August 18 at 10am.

    A Secret Sounds presale kicks off  on Friday August 15 at 11am, concluding on Monday August 18 at 10am.

    General public tickets go onsale on Monday August 18 at 11am. 

    For complete tour and ticket information, visit secretsounds.com   

    With over 260 million global streams and fans hanging onto every lyric, Holly Humberstone has already built a career defined by honesty, connection, and craft. She’s collaborated with The 1975’s Matty Healy, covered Prince and Doja Cat, and joined Sam Fender on a rework of “Seventeen Going Under” — and still, her greatest strength remains her voice: quiet, piercing, unmistakably her own.

    In addition to her own shows, Holly will also support Sam Fender on his Australian tour later this year.

    HOLLY HUMBERSTONE
    AUSTRALIA 2025

    Presented by Secret Sounds and triple j

    Max Watt’s, Melbourne
    Thursday, November 13

    The Triffid, Brisbane
    Tuesday, November 18

    Factory Theatre, Sydney
    Sunday, November 23

    Tickets on sale Monday August 18 at 11am
    Artist presale: Fri Aug 15, 11am – Mon Aug 18, 10am
    Secret Sounds presale: Fri Aug 15, 11am – Mon Aug 18, 10am 
    For complete tour and ticket information, visit: secretsounds.com

     

    About Holly Humberstone

    Holly Humberstone’s devotion to the art of storytelling came to full fruition with the release of her debut album Paint My Bedroom Black in 2023 — a bold, expansive body of work that cemented her status as one of the UK’s most vital new voices. Across tracks like “Antichrist,” “Room Service,” “Superbloodmoon” (featuring d4vd), and the stirring title track, Holly captured the restless confusion of early adulthood: falling in love, falling apart, and piecing yourself back together in the quiet of your own space. The album was met with widespread acclaim for its emotional depth and sonic ambition, marking a clear evolution from her earlier work while staying rooted in the intimate lyricism that first brought her acclaim.

    From her breakout 2020 debut EP Falling Asleep at the Wheel to her critically acclaimed 2021 follow-up The Walls Are Way Too Thin, Holly has built a global fanbase with songs that articulate the universal anxieties of growing up, leaving home, and finding your place in the world. Early singles like “London Is Lonely” and “Sleep Tight” struck a chord with listeners for their portrayal of isolation and change, while tracks such as “Scarlett” and “Haunted House” showcased her ability to turn personal moments into soaring anthems. Her writing draws from family, friendship, and internal conflict — always delivered with piercing honesty and an eye for lyrical detail. Her 2024 Work In Progress EP offered a further glimpse into her internal world, with tracks like “Dive” and “Down Swinging” exploring self-doubt, growth and resilience.

    From playing songs in her haunted childhood home to headlining shows around the world, her live performances have become an essential part of her story. She’s played the Woodsies Stage at Glastonbury to a packed out tent, headlined Barn On The Farm, sold-out venues across Europe, Japan and Australia, and toured the US with Olivia Rodrigo and Girl in Red. In 2024, she took another major leap — joining Taylor Swift’s Eras Tour as a support act at Wembley Stadium, performing to tens of thousands and introducing her introspective songs to a new legion of fans.

    Whether with a full band or alone on stage with just her guitar and keys, Holly is a compelling performer. At venues like London’s Kentish Town Forum and Shepherd’s Bush Empire which she sold out, she has created moments of quiet power, including a standout performance of “Friendly Fire” alongside Bombay Bicycle Club’s Jack Steadman. Her live shows reflect the same emotional vulnerability that runs through her music — intimate, confessional, and unafraid to sit with discomfort.

    FOLLOW HOLLY HUMBERSTONE
    WEBSITE | YOUTUBE | TIKTOK | FACEBOOK | INSTAGRAM | SPOTIFY


    Continue Reading

  • Study Reveals Stalking’s Brutal Toll on Women’s Heart Health

    Study Reveals Stalking’s Brutal Toll on Women’s Heart Health

    A massive new study has confirmed what a third of American women likely could have guessed: experiencing stalking is bad for your health. Specifically, women who have been stalked appear to be at a higher risk for cardiovascular disease (CVD) compared to those who haven’t experienced that particular branch of psychological violence.

    For the study, published in the American Heart Association’s journal Circulation, researchers analyzed data from the Nurses’ Health Study II—one of the largest long-term investigations into what influences women’s chronic disease risk. They examined health records from more than 66,000 women over a 20-year period beginning in 2001. At the start, participants reported whether they had ever been stalked and whether they had obtained a restraining order against their stalker.

    After analyzing the data, researchers found that the women who had experienced stalking were around 41 percent more likely to have suffered from CVD compared to women who hadn’t. And for women with a restraining order, that number increased to 70 percent. (The researchers also accounted for sociodemographic and family factors when calculating these numbers and came up with statistically similar results.)

    This info is validating, particularly on the grander health scheme of things, but sadly unsurprising. While stalking is often treated as harmless or even romantic in pop culture depictions (think: Edward watching Bella through her window in Twilight, or Mark’s obsessive filming of Juliet at her wedding in Love Actually), it is a dangerous form of abuse that can cause severe psychological distress (and even post-traumatic stress syndrome), which in and of itself is a risk factor for heart disease. And CVD is already the leading cause of death in women worldwide (yes, we’re more likely to die after a heart attack than men).

    But let’s crunch some numbers anyway. There are roughly 168 million women in the U.S. right now. Considering that an estimated one in three women experience stalking (noting that it’s most often perpetrated by someone they know, like an ex-boyfriend or acquaintance), that nets out to roughly 56 million Americans having an even higher risk for CVD. That’s unacceptable.

    We need doctors and public health officials to take this seriously. While some previous research has established violence as a risk factor for CVD, most studies have focused on physical, not psychological, violence. “Our findings indicate that, to better mitigate women’s risk of CVD, more attention needs to be paid to their experiences of violence,” Karestan Koenen, PhD, one of the study’s authors and professor of psychiatric epidemiology at the Harvard T.H. Chan School of Public Health, shared in a press release.“We need to improve screening for stalking and other forms of violence, and provide resources for women to protect themselves. And zooming out further, on a broad public health level, we need to do better in addressing and preventing the root causes of violence against women.” Amen.

    Note: If you or a loved one are suffering from abuse, contact the National Domestic Violence Hotline by calling 1-800-7233 or visiting www.thehotline.org.

    Headshot of Sofia Lodato

    Sofia Lodato (she/her) is the editorial assistant at Oprah Daily. Aside from reading, writing, and wellness, she is a lover of all things media-related, and can usually be found overanalyzing her latest favorite show, album, or video game.
     

    Continue Reading

  • Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say – Reuters

    1. Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say  Reuters
    2. Spy chips and technological war: how the USA and China face off on high-tech export  The Cryptonomist
    3. White House’s Plan For Advanced Semiconductor Regulations Starts To Emerge  Forbes
    4. US Explores Location Trackers for AI Chips, Official Says  Bloomberg.com
    5. U.S. Reportedly Uses Trackers In AI Chip Shipments  TradingView

    Continue Reading

  • Kid Cudi Didn’t Want to Testify in Diddy Trial: ‘I Got Subpoenaed’

    Kid Cudi Didn’t Want to Testify in Diddy Trial: ‘I Got Subpoenaed’

    Kid Cudi sat down with CBS News‘ Anthony Mason to speak on his recently released autobiography, Cudi: The Memoir, and was asked about his much publicized testimony during the Diddy trial.

    “It was really hard. I didn’t want to do it,” he answered after being asked how hard it was for him to testify. “I got subpoenaed and I knew I was helping Cassie and I just wanted to be there for her and help her out. It was a tough situation.”

    He then added that he felt backlash from fans on social media and friends in his personal life for taking the stand even though he’s never associated himself or made music about street life.

    “The backlash was swift,” Cudi admitted. “I had a lot of people that supported me, but there were a few that were — you know — had some opinions about it. It was interesting because I’m not no street dude. I don’t live by no code, you know? I guess it’s because I’m a rapper, people just threw that on me. But, like, my music has never been about that and I have never tried to pretend I was about that. I’m from the suburbs, baby, you know what I’m sayin’? Straight up.”

    Adding, “But I ain’t let it faze me, so I know I was doing the right thing. F— ’em, you know. Let those mother—-ers think whatever they want.”

    And when it finally came to actually being on the stand, Cudi said that the experience was a “weird” one. “It was weird, man, because that was the first time I had seen him in a while,” he said. “We made eye contact a couple times. It was f—king weird, but I’m glad I got through it. Got it behind me. I know I did the right thing, so that’s all that matters.”

    @cbsmornings

    Rapper @KidCudi reflects on testifying in Sean “Diddy” Combs’ trial about his brief relationship with Cassie Ventura and the events that followed, including a suspicious break-in at his home. “It was weird, man, because that was the first time I had seen him in a while, you know? We made eye contact a couple times… I did the right thing, so that’s all that matters.”

    ♬ original sound – CBS Mornings –

    Elsewhere in the interview, the Ohio rapper was asked about his broken friendship with Ye (formerly known as Kanye West) and said that his former collaborator “said some things that there’s no coming back from.”

    Cudi: The Memoir was released on Tuesday, Aug. 12 and is available wherever books are sold.

    You can watch the full conversation below.


    Continue Reading

  • Smokeless Tobacco, E-Cigarettes Associated With Development of AMD

    Smokeless Tobacco, E-Cigarettes Associated With Development of AMD

    Individuals who used smokeless tobacco and e-cigarettes had an increased risk of developing age-related macular degeneration (AMD) according to a new study published in the Journal of VitreoRetinal Diseases.1 The results emphasize the need for continued research into the association.

    Smokeless tobacco and e-cigarettes have shown an association with the development of AMD | Image credit: iama_sing – stock.adobe.com

    The leading cause of blindness in those aged 65 years and older is AMD. With the frequency of its occurrence, regulating modifiable risk factors is an important aspect of reducing the risk of its development. An important modifiable risk factor for AMD is cigarette smoking, which has been well-established as a risk factor for both AMD and cataracts.2 However, the exposure to tobacco and nicotine alone has a less-studied history. This study aimed to use the National Health Interview Survey (NHIS) to identify any association between AMD and smokeless tobacco or e-cigarettes.

    The NHIS has been conducted in person each year by the CDC since 1957 and has a cross-sectional design. The survey is completed by participants in all 50 states and Washington, D.C., to collect data. The survey receives updates every 15 years to include pertinent questions. This study in particular used the 2017 database to extract data on those who reported use of smokeless tobacco and e-cigarettes. Age, sex, race, number of packs of cigarettes used per day, and body mass index were extracted to be used as covariates. Associations were calculated using unadjusted and adjusted logistic regression models.

    There were 26,689 participants who responded to the survey and were included in the analysis. AMD had a weighted prevalence of 1.9% in the participants, with those having AMD being significantly older, disproportionately non-Hispanic White, and more often women.

    The unadjusted OR for AMD in those who had been exposed to e-cigarettes was 0.44 (95% CI, 0.32-0.60); after adjusting for covariates, the OR increased to 1.08 (95% CI, 0.73-1.60). Smokeless tobacco products had a slightly stronger association with AMD. Those who were exposed to smokeless tobacco had an unadjusted OR of 0.96 (95% CI, 0.68-1.36) of contracting AMD. This increased to an OR of 1.49 (95% CI, 1.02-2.18) when adjusting for covariates.

    There were some limitations to this study. Institutionalized populations and those without a fixed address were not included in NHIS, which could affect the results. The survey is based on self-reporting data, which could be subject to social desirability bias, recall bias, and bias in health care access. The use of e-cigarettes and smokeless tobacco, as well as the prevalence of AMD, could be underestimated due to the self-report nature of the study. The duration of use and the frequency of use were not assessed in this study due to lack of data, which prevented analysis on the prevalence or severity of AMD as associated with these characteristics.

    “Based on our findings, we recommend that public health efforts be aimed at raising awareness about the increased risk of developing vision-threatening diseases such as AMD that may be conferred with tobacco use, and that the message include use of not only cigarettes but also tobacco-alternative products as well,” the authors concluded. The authors urged future studies to provide long-term data on the use of e-cigarettes to understand its effect on AMD.

    References

    1. Ochoa A III, Brinson J, Chin Loy K, Yousuf SJ. Associations between electronic cigarettes, smokeless tobacco, and age-erlated macular degeneration in the 2017 United States National Health Interview Survey. J Vitreoretin Dis. Published online August 10, 2025. doi:10.1177/24741264251362886

    2. Vision loss and blindness: overview of smoking and eyesight. CDC. Updated February 24, 2025. Accessed August 13, 2025. https://www.cdc.gov/tobacco/campaign/tips/diseases/vision-loss-blindness.html

    Continue Reading

  • iPhone 17 Air dummy unit in Sky Blue stars in new hands-on video

    iPhone 17 Air dummy unit in Sky Blue stars in new hands-on video

    There’s been a lot of talk about colorways for Apple’s upcoming iPhones, as all of the models are getting new hues. The iPhone 17 Air itself is an entirely new model, one with which Apple will be testing how far people are willing to go for a sleek look – how much they’re willing to pay for it, both in actual money and in terms of tradeoffs like a tiny battery and just one rear camera.

    We’ll find out soon enough, but until we do, let’s enjoy a hands-on video showing an iPhone 17 Air dummy unit in the upcoming Sky Blue colorway.

    It’s not quite ‘baby blue’, but it’s more blue than other desaturated blues, and it can in fact remind you of the sky. It looks pleasant and once again the iPhone 17 Air’s insane thinness is on display – the latest rumor on the matter claimed we should expect it to measure 5.65mm to 5.7mm.

    The iPhone 17 family is expected to be unveiled at a special event on September 9.


    Continue Reading

  • Rapidly Evolving Human Genomic Region Tied to Neural Development, Flexible Thinking – Genetic Engineering and Biotechnology News

    1. Rapidly Evolving Human Genomic Region Tied to Neural Development, Flexible Thinking  Genetic Engineering and Biotechnology News
    2. How primate brains differ from humans  galvnews.com
    3. New research sheds light on what makes the human brain unique  News-Medical
    4. Genetic Switch May Be Key to Human Brain’s Unique Abilities  Neuroscience News

    Continue Reading