
AI is now writing half the code at this company, and it is not Google or Microsoft
"We've moved from GitHub Copilot, which is an autocomplete system, to Cursor, and now things like Windsurf, where nearly all of the code is written by AI," he said. He also mentioned that it's difficult to estimate exactly how much code is human-written, but he believes it's now the smaller portion.This change isn't just helping Robinhood write code faster. It's also helping the company save money and improve how its teams work. Tenev said that AI has had a major impact on departments like engineering and customer support. "The impact that it's had on internal teams has been huge,' he noted. He also said the company has been quiet about how much AI it's using behind the scenes, but the results have been impressive.Robinhood's growing use of AI comes at a time when the company is performing well in the market. Its stock price has jumped over 170 per cent since the start of the year. This growth has been driven by several factors, including the company's push into crypto tokens based on private stocks, and new product rollouts like a prediction market feature for users.While Robinhood is leading in terms of AI code generation, other big tech firms are also increasing their use of AI in similar ways. Microsoft CEO Satya Nadella said recently that AI writes up to 30 per cent of code in some projects. He also pointed out that the company is using AI to review code, making development more efficient.Google's CEO Sundar Pichai gave a similar update during Alphabet's latest earnings call. He said over 30 per cent of new code at Google is AI-written, which is up from 25 per cent a few months ago. Meta's CEO Mark Zuckerberg has also said that he expects AI will soon handle half of the coding at the company, especially for projects like its Llama models.Some companies are even changing their hiring plans because of AI. Salesforce CEO Marc Benioff announced earlier this year that the company would pause new engineering hires in 2025 due to AI increasing developer productivity by 30 per cent. Stripe, a payments company, laid off hundreds of workers including some in engineering, partly due to the change toward AI-powered development. Only time will tell whether AI will benefit humans or not in a big way.- Ends
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Mint
10 minutes ago
- Mint
How your Android phone can alert you about an earthquake (and how to enable it)
With recent earthquakes rattling cities like Delhi and tremors felt across North India, knowing a quake is coming, even a few seconds early, can be the difference between panic and action. Most Android smartphones already have a built-in system to alert you before the worst of the shaking hits. You just need to know how to turn it on. Your phone's accelerometer, the same sensor that knows when you rotate the screen, can detect the early tremors of an earthquake, known as P-waves. These are fast but not destructive. Once detected, your phone shares anonymous location and motion data with Google's servers. If enough phones in an area pick up similar signals, the system confirms a quake is happening. Before the slower but more dangerous S-waves hit, the server sends out an alert, giving you precious seconds to react. This system is being rolled out in phases across India, with alerts already active in many large cities and quake-prone regions. If you use an Android phone running version 5.0 (Lollipop) or above and have Google Play Services enabled, you're likely covered. The alerts are automatic in supported areas, but you need to have them turned on in your settings. Follow these quick steps to activate earthquake alerts: Step 1: Open the Settings app Step 2: Scroll down to 'Safety and emergency' (on some phones, it may be under 'Location'). Step 3: Tap on 'Earthquake alerts' Step 4: Toggle the switch to Enable alerts Make sure your location is turned on. The system works best when your phone knows where you are. The data sent to Google is anonymous and used only for quake detection, not for tracking you. To check if alerts are active, search for 'Earthquake' in your Settings app and verify the toggle. If your phone buzzes with a quake warning: Drop, cover, and hold: Get under a table or sturdy surface. Stay away from windows and objects that could fall. Don't panic or run: Use the few seconds to secure yourself. Even a five-second heads-up can be life-saving. You'll need an internet or mobile signal for the alert to reach you. Remote areas with weak coverage may not benefit fully. This system is a supplement, not a replacement, for official government alerts or emergency protocols.
&w=3840&q=100)

Business Standard
10 minutes ago
- Business Standard
Android, Play Store generated ₹4 trn revenue, 3.5 mn jobs in India in 2024
A new report by UK-based research firm Public First has highlighted the massive contribution of Google Play and Android to India's digital economy. According to the study, the Android ecosystem helped generate around ₹4 trillion in revenue for app developers and the broader economy in 2024, news agency PTI reported. India is among the world's largest and fastest-growing digital economies. This rapid growth is supported by the increasing use of smartphones, low-cost internet, and a vibrant community of app developers and tech entrepreneurs, the report said. What's powering India's app ecosystem? Android is the most popular mobile operating system globally and is used across smartphones, tablets, laptops, and other smart devices. Google Play, the official app store for Android, is the main platform for downloading and distributing apps. 'In 2024, the Play and Android ecosystem generated ₹4 trillion in revenue for app publishers and the wider economy in India,' the report stated. The report estimated that over 3.5 million jobs were created in India due to the Android and Google Play app ecosystem. India also has the second-largest number of active developers on Google Play, with over 1 million developer jobs supported by the platform. Indian apps see global reach, high downloads Nearly 79 per cent of Indian app developers have international users, the report noted. In 2024, apps made by Indian developers were downloaded 7,200 million times from the Play Store — 6,000 million times by Indian users and 1,200 million times by users abroad. Google adds new tools to improve Android app security To improve user safety, Google has rolled out new security features through Google Play Protect, which scans apps and protects users from harmful behaviour — even for apps installed from outside the Play Store. Play Protect expands fraud safeguards globally Play Protect now auto-revokes permissions from risky apps and disables scanning during calls to prevent scams. It shows Chrome alerts if protection is off and adds a 'verified' badge for trusted VPNs. Its fraud prevention tool, built with Singapore's Cyber Security Agency, now covers more countries, including India, to block harmful side-loaded apps.
&w=3840&q=100)

First Post
10 minutes ago
- First Post
Did China-linked hackers access US nuclear secrets through Microsoft?
A critical flaw in Microsoft's SharePoint software allowed China-linked hackers to breach dozens of systems worldwide, including US federal agencies and the nuclear weapons agency. Though no classified data has been confirmed stolen, the breach has put into the spotlight Microsoft's security practices and Beijing's alleged cyber-espionage efforts read more A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this illustration picture taken on May 13, 2017. Representational Image/Reuters A newly uncovered vulnerability in Microsoft's SharePoint server software has led to a significant cybersecurity intrusion involving government agencies and private organisations around the world. Among the most high-profile victims is the US National Nuclear Security Administration (NNSA) — the agency that manages the country's nuclear arsenal. Although current assessments indicate that no classified or sensitive nuclear information has been compromised, the intrusions have revealed serious flaws in software security practices. What happened? The breach emerged after Microsoft announced that hackers were actively exploiting a flaw in on-premises versions of its SharePoint platform — a workplace collaboration system widely used across both public and private sectors. The flaw allowed attackers to remotely access servers, steal credentials, extract cryptographic keys, and potentially install persistent backdoors for further exploitation. STORY CONTINUES BELOW THIS AD This type of vulnerability, classified as a 'zero-day' when first discovered due to the absence of an immediate fix, offered attackers access to internal systems that were not hosted on Microsoft's cloud infrastructure. Microsoft released partial mitigation guidance earlier this month but only issued comprehensive patches for all affected SharePoint versions on Monday, by which time attackers had already begun exploiting the flaw. The issue does not affect cloud-hosted versions of SharePoint, but organisations that maintained self-managed SharePoint installations have been exposed to considerable risk. How is China involved? Microsoft publicly disclosed that at least three threat actors based in China — tracked as Linen Typhoon, Violet Typhoon, and Storm-2603 — were actively using the vulnerability to attack internet-facing SharePoint servers. Two of these groups are believed to be associated with Chinese intelligence agencies, while the third remains under investigation. In a blog post published Tuesday, Microsoft stated, 'As of this writing, Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting these vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities.' This revelation comes amid a broader cyber exploitation campaign believed to involve multiple hacking entities. According to Microsoft and private security firms involved in the investigation, groups not connected to China have also begun leveraging the same SharePoint flaw to infiltrate targets. These actors have varying motivations, including data theft, espionage and ransomware deployment. STORY CONTINUES BELOW THIS AD 'It's critical to understand that multiple actors are now actively exploiting this vulnerability,' Charles Carmakal, Chief Technology Officer at Google's Mandiant Consulting, told The Washington Post. 'We fully anticipate that this trend will continue, as various other threat actors, driven by diverse motivations, will leverage this exploit as well.' Who in the US has been impacted? Investigators have confirmed that at least two US federal agencies have been impacted by the breach, with one US official involved in the incident response saying the number could rise to 'four to five' or more as the situation unfolds. A second official confirmed that the number of affected agencies is likely greater than what has been publicly acknowledged so far, reported The Washington Post. The National Nuclear Security Administration (NNSA) was among the institutions infiltrated, according to a Bloomberg report. Although preliminary assessments suggest that no classified nuclear-related data was accessed, the fact that the agency responsible for safeguarding nuclear weapons was breached has intensified concerns in national security circles. Eye Security, a private cybersecurity firm, reported that at least 54 organisations have suffered breaches related to the SharePoint exploit. The victims include a private US university, a California-based private energy provider, and a federal health agency. STORY CONTINUES BELOW THIS AD Investigators have also found evidence linking US-based compromised servers to IP addresses inside China during the active exploitation window last weekend. Despite the mounting evidence implicating Chinese hacking groups, the US government has not officially attributed the campaign to Beijing. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have acknowledged their involvement in addressing the breach but have refrained from commenting on attribution or the total number of agencies affected. The White House has also declined to issue a statement on China's possible role. How has Beijing responded to the allegations? The Chinese Embassy in Washington responded to inquiries about the incident by reiterating its standard position on cybercrime: 'China firmly opposes and combats all forms of cyber attacks and cyber crime — a position that is consistent and clear,' a spokesperson said. 'At the same time, we also firmly oppose smearing others without solid evidence.' This statement echoes prior Chinese responses to cyber espionage accusations by Western governments. Although China did not deny the allegations outright, it maintained that it is a victim of cyber intrusions as well. Security researchers assisting US federal investigators have pointed out that some of the early victims were organisations with a strategic interest to the Chinese government. STORY CONTINUES BELOW THIS AD One analyst noted that network activity from affected SharePoint systems was traced to IP addresses geolocated in mainland China. 'We assess that at least one of the actors responsible for this early exploitation is a China-nexus threat actor,' said Carmakal, whose firm is directly involved in the response effort. How is Microsoft dealing with the breach? Critics argue that Microsoft has failed to adequately safeguard its widely used software, despite its central role in supporting sensitive systems across government and industry. 'Government agencies have become dependent on a company that not only doesn't care about security, but is making billions of dollars selling premium cybersecurity services to address the flaws in its products,' said US Senator Ron Wyden (D-Oregon) in response to the latest incident. Democratic lawmakers from the House Homeland Security Committee have requested briefings from Microsoft and CISA concerning Microsoft's use of China-based engineers for servicing some US government systems. This is not the first time Microsoft has faced questions about its security posture in the context of Chinese cyber espionage. In 2023, Chinese-linked actors exploited a different Microsoft vulnerability to gain access to emails of the US ambassador to China and the US Commerce Secretary. That breach prompted a federal review panel to sharply criticise Microsoft's security practices. STORY CONTINUES BELOW THIS AD More recently, the Pentagon announced a review of its entire cloud infrastructure, following reports that engineers based in China had been offering technical support for certain Department of Defense systems. Microsoft has now patched all vulnerable versions of SharePoint impacted by the flaw. The company stated that it is working closely with CISA, the US Department of Defence's Cyber Defence Command, and other global cybersecurity partners to mitigate the damage. A Microsoft spokesperson confirmed that the company has been 'coordinating closely' with key stakeholders and is urging customers to implement all security updates immediately. Beyond patching the flaw, experts recommend that organisations conduct thorough internal reviews. This includes replacing cryptographic keys, deploying advanced anti-malware tools, and auditing systems for signs of compromise. According to Palo Alto Networks, organisations using SharePoint may also have seen spillover effects into other Microsoft services like Outlook, Teams, OneDrive, and Office, which are often integrated into SharePoint workflows. The SharePoint exploit is already being described as one of the most serious cybersecurity incidents of US President Donald Trump's second term. STORY CONTINUES BELOW THIS AD Also Watch: With inputs from agencies