
Korg's new compact synth is also a self-playing percussion instrument.
Instead of just including a library of pre-recorded samples captured from percussion instruments like marimbas and xylophones, Korg Berlin 's Phase8 features eight 'replaceable and tunable metal resonators' that are played using electromechanical triggers.
Originally developed as a collection of prototypes, Korg Berlin says the finalized version of the Phase8, demonstrated in a recent video, will go on sale some time in the first quarter of 2026.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
an hour ago
- Forbes
Three Crypto Wallet Trends You Can't Afford To Miss In 2025
Crypto Wallet Trends in 2025 (Photo by Smith Collection/Gado/Getty Images) If you're anything like me, you've seen crypto wallets evolve from niche products into indispensable superapps shaping how millions globally interact with blockchain technologies. But I wanted to see it in the data. So, I found the new report from Dune Analytics and Now, having done a deep dive into the Dune and Addressable "Crypto Wallets 2025" report, three transformative themes stand out—smart wallet innovation, wallet ecosystems evolving into financial superapps, and clear geographic trends shaping wallet adoption. Mats Olsen, Dune's Co-founder and CTO Dune's Co-founder and CTO, Mats Olsen, explained to me, "At Dune, we believe data is the backbone of innovation in web3. Our mission has always been to make crypto data accessible. It's important to note that wallet data isn't just a tool for analytics—it's the foundation for building smarter, more intuitive applications that empower users to own and navigate their digital lives. " Let's unpack these powerful shifts and what they mean for the future of crypto. Smart wallets are unlocking a better crypto UX. These Smart wallets work thanks to new technology called account abstraction and something known as ERC-4337. These let wallets do more advanced things—like letting you log in without a password, making transactions without paying fees yourself, and even recovering your wallet if you lose access. The Dune and Addressable report pulled out the essentials on Smart Wallets. The most notable growth story? Coinbase Smart Wallet, which saw weekly active users jump from 15,000 in January 2025 to over 40,000 by April 2025, largely due to its native integration with Base, Coinbase's Layer 2. This flywheel—app onboarding + onchain execution—has positioned it as the most prominent consumer-facing smart wallet. And, Base has emerged as the leading network for smart wallet activity, with over 65% of smart account deployments and 87% of all UserOperations by April 2025. It's become the go-to execution layer for high-frequency, low-cost smart wallet usage. Although Safe dominates in raw deployment numbers—43 million accounts and 63% market share—many of these are backend implementations, such as those automatically deployed by apps like Worldcoin. In contrast, platforms like Coinbase Smart Wallet are seeing direct consumer usage and growing retention, now approaching 60% returning user rate. So what's the real takeaway? Smart wallets are shifting from technical novelty to infrastructure backbone. Whether embedded in apps or powering direct user interactions, they're defining the next era of Web3 onboarding. Just like superapps in Asia—such as WeChat or Grab—combine everything from payments to messaging into one app, crypto wallets are transforming into all-in-one financial superapps. They're becoming central hubs where users can manage every aspect of their digital lives. But what exactly are these wallets doing—and why does it matter? Today's wallets go far beyond storing tokens. They now offer integrated tools that make engaging with crypto simple, fast, and powerful: These services once required using multiple platforms and tools. Now, they're accessible with just a few taps from a single wallet. And the adoption is real: Phantom Wallet Supporting this shift are infrastructure providers like Privy and Reown. Privy, for instance, allows apps to create secure wallets at login—in under 200 milliseconds. That makes it easy for new users to get started and for developers to build wallet-native experiences. And did you know that AI Agents now have their own Crypto Wallets? In short, wallets are no longer just tools for crypto insiders. They are quickly becoming the financial superapps of Web3—combining banking, investing, gaming, and identity into a single, streamlined experience. One of the most eye-opening insights from the Dune Analytics and Addressable report is the clear geographic diversification in wallet adoption. In Asia, custodial wallets like OKX and Bitget dominate, driven by ease-of-use and strong local brand recognition. OKX alone controls a substantial portion of wallet capital in countries like South Korea and China, highlighting trust in custodial models in these regions. On the flip side, non-custodial wallets like MetaMask and Phantom have built strong user bases globally, especially in emerging markets. Nigeria, India, Indonesia, and Vietnam consistently rank among top countries in wallet usage. Here's the catch: while user numbers soar in these regions, capital concentration remains firmly skewed toward developed markets like the U.S., South Korea, and Europe. Asaf Nadler, COO and Co-Founder, Addressable And in chatting with Asaf Nadler, COO and Co-Founder, Addressable, he revealed some more findings. 'This report marks the first time we've been able to explore the concrete user behavior of over 20 leading wallets across 15 million users—made possible by Addressable's ability to match wallets to real individuals and their actions. The user data revealed two critical new insights: first, that emerging markets like Nigeria and India aren't just participating—they're leading global crypto adoption and may deserve far more strategic focus; and second, that the wallet landscape is highly saturated, with fewer than 10 players dominating user market share. These findings reshape how we think about growth, competition, and the next frontier of crypto adoption.' This dual dynamic poses fascinating strategic implications. Wallet providers must balance high-volume user acquisition strategies in emerging markets with high-capital management strategies in developed regions. It's a complex yet thrilling balancing act that will shape the future growth trajectory of wallet ecosystems. If you're tracking crypto trends, it's clear that wallets are no longer peripheral—they're central to the user journey and blockchain adoption. Smart wallets are rapidly becoming essential infrastructure, financial superapp functionalities are redefining user expectations, and geographic diversification is shaping global adoption strategies. As we look forward, I see wallets not just as storage or transaction tools, but as comprehensive gateways redefining digital identity, financial inclusion, and crypto usability globally. And as the lines between traditional financial services, web3 infrastructure, and seamless UX continue to blur, wallets will undoubtedly remain at the heart of crypto innovation. So, what's next? With standards like Ethereum's EIP-7702 enabling even traditional wallet users to upgrade to programmable smart accounts, we're entering a new era where wallets become smarter, more versatile, and integral to every digital interaction. Buckle up—wallets aren't just evolving; they're transforming crypto from niche to mainstream right before our eyes. Did you enjoy this story about the new and Dune Analytics report on crypto wallets? Don't miss my next one: Use the blue follow button at the top of the article near my byline to follow more of my work.


Forbes
an hour ago
- Forbes
Tokenize To Maximize: Securing Data Without Compromise
The tension between data hunger and data hazards may be the defining challenge of the modern enterprise. The volume of data collected and stored by enterprises has exploded in the past few years. This data is valuable, and very often sensitive, so it needs to be managed and secured appropriately. But this is not just about caution. Strong data security helps businesses gain maximum value from that data. It offers the ability to push the envelope of innovation and experimentation. To achieve this sweet spot where risk management doesn't stand in the way of innovation, companies need to implement the right proactive data security techniques. To secure data effectively, businesses must first understand what data they have and where it's located. This involves cataloging and categorizing data across the business and implementing data discovery capabilities. Without creating and maintaining a comprehensive inventory of data assets, organizations cannot effectively safeguard sensitive data through access controls and protection methods. Many data assets also contain sensitive elements—identifying the nature of the data at a granular level enables companies to establish fine controls at the level of individual entries. Next, companies must ensure the right people have access to the right data at the right time. This concept, often known as the principle of least privilege, is foundational for ensuring strong data governance and minimizing risk. Role-based access control (RBAC) is a common technical approach to this idea, where permissions are tied to job functions, or project team membership, rather than individuals. Other methods like attribute-based access control (ABAC) are also increasingly adopted by enterprises. These approaches simplify access management, ensure employees only have access to the data they need to do their jobs and reduce the risk of data misuse or accidental exposure. Responsible businesses have multiple options when it comes to making sensitive data safe to use for analytics, building applications or training AI models. They are very unlikely to use unprotected, plain-text data, containing all of the information the company possesses. This would be a data hazard, risking the safety of that information. Once sensitive data is detected, companies must apply the right protection technique, which is dependent on the use case, data governance policies and overall security posture of the organization. There are a variety of techniques that companies can apply based on these dependencies. Some of the most common approaches include: In today's business environment—where speed, scale and trust are imperative—tokenization offers a sustainable way forward for data-driven innovation. It empowers businesses to unlock the full value of their data, powering use cases like data analytics, ML model training, agentic AI and third-party data sharing, among others. Having seen the value of tokenization first hand, Capital One has invested in tokenization as a method to secure its most sensitive data. Today, the business runs more than a hundred billion tokenization operations a month across hundreds of applications and launched a tokenization solution, Capital One Databolt, to help businesses tokenize their own sensitive data without compromising performance. Data security cannot be treated as an afterthought—especially as AI becomes foundational to how businesses operate. CIOs, CISOs, CDOs and their teams are at the center of this shift, tasked with managing high volumes of data that need to be well managed and used in real time. The solution is not to slow down innovation in the name of security—but to implement data strategies that harness the right techniques and systems where the two reinforce each other.


Washington Post
an hour ago
- Washington Post
Nvidia chief calls AI ‘the greatest equalizer' — but warns Europe risks falling behind
PARIS — Will artificial intelligence save humanity — or destroy it? Lift up the world's poorest — or tighten the grip of a tech elite? Jensen Huang — the global chip tycoon widely predicted to become one of the world's first trillionaires — offered his answer on Wednesday: neither dystopia nor domination. AI, he said, is a tool for liberation.