Sunday, September 14, 2025
Home Blog Page 1811

Researchers Uncover Chilling Details of Ancient Egyptian’s Final Moments: ‘Screaming Mummy’ Met a Painful Demise

0

A 3,000-year-old Egyptian mummy, infamous for its unsettling visage, may have met a gruesome end, according to a team of investigators who believe she succumbed to an agonizing ordeal. The unearthing of this relic lends substantial evidence to a hypothesis long debated, which emerged approximately a century ago with the initial discovery of a mummy.

In 1935, an expedition from The Metropolitan Museum of Art unearthed the mummy of a mother at the site of ancient Thebes, specifically within the tomb of Senmut, where it was discovered entombed in a wooden coffin beneath the burial chamber. In the midst of desiccated wrappings, a mysterious figure lay entombed, her hands cradling a jet-black coiffure and glinting ornaments of gold and silver. Yet, it was her visage that proved most captivating – her mouth frozen in an eternal scream, her jaw poised precariously askew.

In 2020, a thorough evaluation of the approximately 3,000-year-old mummy conducted by Zahi Hawass and Sahar Saleem revealed that the Historical Egyptian lady succumbed to a coronary heart attack; notably, the team concluded that the embalming process effectively preserved her anguish, earning her the moniker “the screaming mummy.” In academic circles, the specimen is referred to as “Unknown Lady A.”

A new study has shed light on the long-standing question of whether the woman actually met her demise under the dramatic conditions initially reported.

“In ancient Egypt, the process of mummification was crucial for preserving bodies to ensure they appeared radiant in the afterlife,” explained Dr. Saleem, a radiologist at Cairo University and the study’s lead author, in an email to Gizmodo. “To forestall any perceived disrespect, they’ve resorted to immobilizing deceased individuals by securing their jaws to prevent the natural post-mortem relaxation of facial muscles.”

“We found the mummified body to be remarkably well-preserved, with remnants of luxurious embalming materials scattered around its perimeter.” It appears that the mummification process was haphazard, with the embalmers simply neglecting to close her mouth.

It’s possible that the woman experienced a rare post-mortem phenomenon known as cadaveric spasm, a localized stiffening of muscles that can occur shortly before death. The analysis reveals that the muscles in question remained contracted for approximately 36 hours, implying that the individual may have been embalmed before the muscles had a chance to relax, thereby preserving her facial expression at the time of death. Due to the circumstances, the embalmers may have been precluded from sealing her mouth in their usual manner.

The Ancient Egyptian 'screaming mummy.'
The enigmatic ‘Screaming Mummy’ of Ancient Egypt.

Researchers speculate that the woman may have succumbed to a coronary artery occlusion, ultimately leading to her demise. In 2013, researchers made a fascinating discovery: 34 percent of ancient Egyptian mummies examined at the time showed conclusive evidence of cardiac issues. According to the CDC, approximately one death out of every five in 2022 is likely linked to a form of coronary heart disease.

The following improvements were made:

Randall Thompson, a cardiologist at St., said that “the scientific inquiry into various mummification resins and supplies in this study constitutes valuable contributions, with the authors’ methods being both innovative and comprehensive.” The Luke’s Mid-America Cardiovascular Institute’s lead researcher on a groundbreaking study examining the history of cardiovascular disease across ancient civilizations has emailed Gizmodo.

“Though the study’s authors aptly address the reason behind the open mouthedness of the mummy, a crucial gap exists in the lack of direct evidence specifically linking this specimen to their proposed theory or refuting alternative explanations.” “I imagine they’re right, nevertheless. Their rationalization is sensible.”

Thompson cautioned Gizmodo in 2020 that museum curators and anthropologists often construct elaborate narratives around a mummy based on limited factual evidence, with little opportunity for independent verification or dispute.

Saleem’s team reinforced her initial discovery by emphasizing that the embalmers treated the deceased with a sense of respect, albeit one tempered by financial constraints. The thorough evaluation disclosed that the lady’s skin was expertly preserved with a blend of frankincense and juniper essentials, while her natural hair was meticulously treated with henna and juniper. Even her wig received specialized attention, infused with the energizing properties of quartz and crystals. Her lips appeared slack and unfastened, suggesting an ineptitude on the part of the embalmers rather than any sudden shock or surprise.

Not all agree, nevertheless. “With muscle relaxation occurring as the body succumbs to dying, the mouth often lies passively agape,” wrote Gregory Thomas, a cardiologist at UC Irvine unconnected from the study in question, in an email to Gizmodo. To accurately describe the post-mortem actions of embalmers, whether from a bygone era or contemporary times, practitioners habitually close the deceased’s mouth if it remained open upon their initial examination. The most probable explanation for the CIT8’s frantic expression lies in the fact that her mouth remained unclosed during the embalming process.

The cadaveric spasm, an uncommon phenomenon that defies easy comprehension, typically occurring exclusively in the context of forensic investigations? Extra forensic research may also be warranted,” Saleem added. “As a result, further research into mummies exhibiting similar scream-inducing facial expressions may provide additional insight into this phenomenon.”

Joining forces with leaders from Google Cloud, Aerospace, Qualcomm, and more at Disrupt 2024?

0

TechCrunch might just be descending upon San Francisco from October 28 to 30 – and we’re absolutely thrilled! Bringing innovative solutions throughout every phase of your entrepreneurial odyssey requires collaboration with world-class partners who share your vision, and we’re grateful to have them by our side as co-creators of this unparalleled event. Tap into the collective wisdom and resources of leading tech companies to gain valuable insights and expertise. Their involvement energizes, motivates, and propels your organization forward with unparalleled momentum.

Discover the latest cohort of firms poised to help propel your business to new heights. Here’s where you’ll find them and what they’re up to.


Don’t overlook the opportunity to engage with cutting-edge innovations at the AI stage, and make sure to visit their sponsored expo area.

For the second year in a row, we are pleased to welcome you to both the Area Stage and the Builder’s Stage.

Please ensure you also pass by the exposition area! Their commitment to sponsoring crucial charging infrastructure deserves commendation.

Drop by and spend some time at the park.

Study with these knowledgeable minds at their finest:

Dive deep into the abyss

Among the classes, you’ll see featured presentations displayed on the screen.

Meet companies from around the globe at these prestigious events.

Partner with esteemed entities along the Exhibition Boulevard:

 The conference takes place from October 28 to 30 in San Francisco. New pivotal companions will be announced in the coming weeks.

.

Samsung government: The Galaxy S25 series is set to debut with the most impactful camera and display upgrades.

0

The Samsung CEO vowed to enhance the hardware of their Galaxy S series, guaranteeing customers receive cutting-edge experiences with unparalleled quality. Specifically, Araujo noted that the flagship series will continue to boast the most advanced camera and display specifications. 
Araujo noted that historically, Samsung’s Galaxy S25 and Galaxy S25+ devices were compatible with many Galaxy S25 items globally outside of the US, Canada, and China, thanks in part to the company’s development of efficient software processors and memory chips designed to enhance AI capabilities and deliver premium performance.
While Araujo didn’t specify the upgraded components’ details, speculation suggests that the ‘s 10MP secondary telephoto camera with 3x optical zoom may potentially. Since significant camera advancements were introduced with the original Galaxy S model and its subsequent iteration, the CEO’s opinions may surpass those of the latest Ultra variant.

Notwithstanding concerns surrounding the hardware, Araujo offered insights regarding Samsung’s commitment to safeguarding customers’ sensitive personal data on their personal devices. He further showcased the versatility of Samsung products, seamlessly integrating devices for “synchronous conversations and experiences across our gadgets.” As the company crafts partnerships and collaborations, it appears poised to deploy AI in novel scenarios previously unimaginable.

As the lines continue blurring between devices, it’s intriguing to ponder how Samsung will leverage AI to facilitate seamless interactions between your phone and smart appliances like washers, TVs, and dryers. What remains unclear is the full extent to which AI will streamline interactions between our personal devices, allowing for effortless coordination and synchronization.

Hedera debuts innovative character model, Character-1, tailored for video-centric applications.

0

Stay informed with our daily and weekly newsletters, featuring the latest developments and exclusive insights on pioneering AI security solutions.


A pioneering AI video creation platform, driven by an unwavering commitment to harness the boundless potential of generative AI-powered innovation products.

Hedera, founded by a team of former employees from Nvidia, Google, and Meta, has secured investments from leading firms including Index Ventures, Summary, and A16Z Speedrun.

As part of its seed funding spherical, Hedra also emerged from stealth with the launch of its video-focused foundation model, Character-1. The corporation has announced Character-1, a cutting-edge video avatar model that was first showcased to researchers in June and touted as “the fastest video basis mannequin currently available on the market.”

The company noted that until now, content creators had to make compromises between creative control and production speed through the use of generative video models. “In our June analysis, we found that Character-1’s preview did indeed contradict this notion.” The velocity and ease of use are engineered to turbocharge the effectiveness of content creators and entrepreneurs.

With Hedra’s innovative Character-1 platform, a remarkable milestone has been achieved: more than 350,000 satisfied customers have leveraged its capabilities to produce an astonishing 1.6 million films. The corporation has reported that numerous films featuring Character-1 have gained significant popularity on both Reddit and Instagram, with many of these productions going viral. Hedera emphasizes its capability to empower users in crafting AI-powered pop stars and generating innovative digital content. To further enhance its security and content moderation capabilities. 

The corporation aims to revamp its platform by integrating multiple modalities, effectively combining storytelling, audio, and visual elements within a single, streamlined workflow. 

Hedra’s Character-1 is the newest humanoid robot model recently introduced to the global market, marking a significant milestone in artificial intelligence and robotics innovation. Here is the rewritten text:

HaiPer 1.5, unveiled from stealth mode in March, introduced OpenAI’s Sora. RunwayML, a pioneer in AI-generated films, premiered in July, preceding the launch of Dream Machine in June. 

Another video-sharing platform secured Sequence C funding in July. 

Large corporations such as OpenAI and Google are also at the forefront of combining forces to harness the power of generative artificial intelligence (gen AI) in video creation. Although OpenAI’s Sora has not yet been released to the broader public, the company has collaborated closely with manufacturers and filmmakers. Google .

Thousands of websites worldwide are threatened by a novel cyber attack known as the ‘Sitting Geese’ area hijacking method, which has already compromised over 1 million domains.

0

More than one million domains remain vulnerable to takeover by cybercriminals through exploitation of a notorious tactic known as domain hijacking?

Russian-nexus cybercriminals are exploiting DNS vulnerabilities to secretly seize control of hundreds of domains, according to a collaborative analysis unveiled by leading cybersecurity firms and experts.

Researchers noted that in a Sitting Geese attack, the perpetrator seizes control of a currently registered domain by exploiting vulnerabilities in the authoritative DNS service or internet hosting provider without authenticating as the legitimate owner through either the registry or registrar.

“Sitting geese are simpler to execute, more likely to succeed, and easier to detect than widely publicized area hijacking tactics like.”

When a website is compromised by a malicious actor, it can be leveraged for a range of illicit activities, including distributing malware, launching spam campaigns, and exploiting the trusted reputation of its legitimate owner.

The particulars of a pernicious cyberattack method were first exposed by The Hacker Weblog in 2016, yet this threat remains largely unknown and unresolved to date. Estimates suggest that more than 35,000 domain names have fallen victim to cybercriminals’ tactics since the beginning of 2018, leaving their owners vulnerable and exposed.

“It’s a thriller for us,” Dr. Renee Burton, vice chairman of Menace Intelligence at Infoblox, spoke with The Hacker Information. We frequently receive inquiries from prospective customers, such as those concerning dangling CNAME attacks that also involve the hijacking of forgotten data; however, we’ve never received a question about a Sitting Geese hijack.

The challenge lies in the incorrect configuration of the area registrar and authoritative DNS provider, compounded by the fact that the nameserver is unable to respond authoritatively for a domain it is supposed to serve.

The revised text reads:

This vulnerability necessitates an exploitable authoritative DNS provider, enabling attackers to seize control of the domain on the delegated authoritative DNS provider, without requiring access to the legitimate owner’s account with the domain registrar.

Should the authoritative DNS service for the region expire, a malicious actor could potentially create an account with the provider, claiming ownership of the domain, thereby impersonating the rightful owner to disseminate malicious code.

“With numerous variations of Sitting Ducks emerging, confusion arises when a website is registered and delegated by a provider yet remains unconfigured, according to Burton.”

The Sitting Geese attack has been leveraged by various malicious threat actors, utilizing the compromised domains to distribute numerous visitors via tactics like Vacant Viper and other similar techniques. Additionally, the technology has been leveraged to combat bomb threats, hoax hoaxes, and sextortion scams effectively.

“Companies should critically assess their domain portfolios to identify underperforming assets and consider partnering with reliable DNS providers that offer robust security features, including protection against attacks from sitting ducks.”

Discovered this text attention-grabbing? Join us on social media platforms such as Facebook and Instagram to stay up-to-date with our latest and most exclusive content.

Buyer-Managed Encryption Keys in Rockset

0

Ensuring buyer awareness is paramount for companies of all sizes. The specter of regulation and severe consequences serves as a constant motivator for safety teams working to ensure sensitive information remains inaccessible to both external and internal parties without proper authorization.

Encryption plays a crucial role in enabling secure data transmission and storage. While Rockset utilizes proprietary encryption for client data, certain security organizations require more control over managing their key rotation schedules and possess an emergency ‘break glass’ contingency plan in place to swiftly respond to potential breaches. To enable this, Rockset’s data assortment capabilities can now be securely encrypted at rest with BYOK. Clients retain full control over the master key, while granting the Rockset AWS account permission to perform encryption and decryption operations using that key.

Configuring Buyer-Managed Encryption Keys

To ensure compatibility with this characteristic, clients should create an AWS Key Management Service (KMS) key. Once a group is established and tied to the shopper’s provided KMS key ARN, all subsequent collections within that group are automatically encrypted using that key without requiring further action. While the encryption key ARN cannot be modified once a group has been created, clients do have the option to opt-in to use the provided key.

In the absence of a clear objective, individuals often default to habits that undermine their well-being.

When created, Rockset organizations leveraging Buyer-Managed Encryption Keys function identically to any other Rockset group, with the sole difference being the encryption key employed to safeguard the stored data. Despite this, clients still retain the flexibility to toggle or modify the coverage settings for the provided KMS key. Disallowing access to the encryption key will prevent Rockset from encrypting new data or decrypting existing dataset information, potentially causing query and ingestion errors within minutes.

If Rockset rapidly regains access to the crucial information, queries and ingestion become available within minutes. Despite being unavailable for an extended period, if the KMS key remains inaccessible, it triggers a cascading effect: all collections within the affected group halt their operations, while concurrently, any in-transit data and cached contents are thoroughly cleared out. The integration does not permit Rockset to retrieve information about buyer assortments. Collections that remain paused due to key unavailability for an extended period of time risk becoming irretrievable.

For added insights on leveraging customer-managed encryption keys within your Rockset cluster, explore our comprehensive resources today.

What’s driving digital transformation in retail? Discover the latest insights and trends with our expert analysis.

0

Are delighted to share with you the second instalment of our

Type guides

Meet the latest issue of our fashion magazine, where we’re serving up a stylish summer treat from our exclusive “Workers Picks” and “Hatch Designed” lines, plus Cisco-sponsored fan favorites that are sure to delight!

What’s driving innovation in retail tech?

Following the successful Cisco Stay event in Las Vegas last June, the Cisco Retailer Tech Lab is now showcasing the latest advancements in the retail technology space. As I step into the Tech Lab for the first time, I’m excited to explore the innovative space and experience the latest in cutting-edge technology firsthand. With a curious mind, I make my way around the lab, taking in the array of gadgets, devices, and equipment on display. Suddenly, I’m approached by a friendly staff member who invites me to join a unique event – customizing my own merchandise using Webex Join!

Learn your area’s version now!

All previous volumes are available on our website, where you can log in via SSO.

 


Ensure you stay abreast of our forthcoming publications to gain timely access to the latest Cisco technology and remain ahead of the curve in retail expertise. Join our mailing list today!

During CXC visits, the Cisco Retailer Tech Lab is available for guided buyer tours. Account managers can currently schedule a meeting, and prospects can schedule a tour.

Are you eager to showcase your technical expertise in our cutting-edge Tech Lab facility? Are you seeking fresh connections? Join us today!

Share:

White Home is recommending that use of open supply AI fashions not be restricted

0

The White Home is issuing suggestions to not prohibit using open supply AI fashions, primarily based on a report from the Division of Commerce’s Nationwide Telecommunications and Data Administration (NTIA). 

The report recommends open fashions proceed to be monitored for potential dangers. A part of NTIA’s advice is that the federal government ought to begin an ongoing program for amassing proof of dangers and advantages, evaluating the proof, after which performing on it. 

The report took place due to President Biden’s 2023 Government Order on “Protected, Safe, and Reliable Growth and Use of Synthetic Intelligence.” One of many issues the EO did was instruct NTIA to conduct a report on the “potential advantages, dangers, and implications of dual-use basis fashions for which the mannequin weights are broadly accessible, in addition to coverage and regulatory suggestions pertaining to these fashions.”

Stefano Maffulli, govt director of the Open Supply Initiative (OSI) and one of many main stakeholders of the method, believes these suggestions might be an acceptable means for balancing dangers and innovation. 

“There are plain advantages to analysis in open fashions, significantly in transparency round privateness, safety and bias,” he stated. “We inspired equitable entry to financial advantages by retaining fashions open, as it is a well-established consider innovation globally.”

Dr. Thomas Di Giacomo, chief know-how and product officer at SUSE, agrees that growing fashions within the open will help enhance belief in AI. 

“SUSE believes that every one software program, together with AI, ought to be freely accessed, used, modified and shared transparently by anybody … We imagine community-based requirements relating to AI will deal with the security considerations of AI, as partaking the developer group is among the finest methods to enhance safety protocols and resilience,” he stated. 


You might also like…

Open Supply Initiative is near developing with a definition for Open Supply AI

Open supply in 2024: Tackling challenges associated to safety, AI, and long-term sustainability

What’s driving innovation in the world of artificial intelligence? The answer lies at the intersection of cloud computing and collaborative development.

We’re thrilled to partner with GitHub, enabling its over 100 million developers to build AI capabilities directly from GitHub.com through seamless integrations with Codespaces and Microsoft Visual Studio Code.

More than 60,000 organisations leverage AI’s potential to instantly unlock customised functionality. As the market transitions from experimentation to scalability, we’re witnessing a surge in the number of global builders transforming into AI developers. As AI-driven innovations evolve, the requirements of builders and their needs to access and utilize artificial intelligence models and tools are transforming accordingly.

To facilitate a seamless transition to scaling, we’re thrilled to empower over 100 million developers by enabling them to build AI capabilities directly from GitHub, accompanied by effortless integrations with Microsoft’s Codespaces and Visual Studio Code. As our partnership commences, we seamlessly integrate with ‘s core model selection to provide builders with intuitive APIs, empowering the creation of reliable and production-ready AI capabilities.

Gain deeper insights on how GitHub Fashion’s capabilities can accelerate experimentation and streamline growth cycles within a single platform – straight from GitHub CEO Thomas Dohmke.

Simplifying AI growth 

As artificial intelligence innovation accelerates, Microsoft Azure remains committed to offering the broadest model selection and largest model range to meet the unique needs of AI developers for value, latency, design, and security. Currently, we offer the broadest and most comprehensive mannequin library on the market, featuring the latest advancements from OpenAI, Meta, Mistral, and Cohere, as well as updates to our own proprietary Phi-3 family of small language models. GitHub Fashion’s innovative platform empowers developers to leverage the latest styles, augmented by AI-driven enhancements and cutting-edge frontier technologies. This flexibility enables developers to craft a unique blend of capabilities, optimize performance metrics, and balance cost efficiencies.

While advancements in mannequin innovation offer increased flexibility, they also introduce complexity in selecting the most suitable model for a given situation. At present, construction companies enjoy a wide range of options when deciding between cloud-based and edge, general-purpose vs. activity particular, and extra. Organizations often seek various product designs to achieve higher quality at lower costs, address complex usage scenarios, and cater to diverse customer needs. GitHub Fashion Studio enables developers to effortlessly explore a vast array of models, streamlining model experimentation and selection across the pinnacle of the Azure AI catalogue by rapidly evaluating models, parameters, and prompts.

graphical user interface, application

By opening up Azure AI as a modular platform, we aim to empower our customers to rapidly move from idea to implementation and into the cloud. With Azure AI on GitHub, developers can seamlessly integrate their creative vision into reality by leveraging Codespaces to craft a prototype or tapping into GitHub Copilot’s capabilities to instantly generate code within Microsoft Visual Studio Code.

In the coming months, we will significantly enhance our integration by bringing Azure AI’s cutting-edge capabilities in natural language processing, computer vision, and multimodal intelligence to GitHub, further streamlining the AI software development process with more Azure AI toolchain components.

Integrating security by default 

As builders integrate artificial intelligence into their construction processes, they crave assurance that AI systems will operate reliably, safeguarded against vulnerabilities, and secure from potential threats. GitHub Fashions delivers a solid foundation for developers from the outset, integrating security and safety features powered by Azure AI.

Azure AI collaborates with mannequin providers and other partners to mitigate escalating threats, encompassing cybersecurity vulnerabilities, malware, and other signs of manipulation.

By incorporating our latest models – GitHub Fashions, high-basis fashions, Llama, and Mistral – we’ve further enhanced their capabilities. Azure AI Content material Security provides real-time, integrated protection against threats such as malicious content, copyright infringement, hallucinations, and novel AI-specific attacks like jailbreaks and direct injection exploits?

If builders desire to drill down further, they will customize these controls within Azure AI, leveraging evaluations to validate and monitor their performance continuously, ensuring ongoing quality and security.

What’s the simplest way to integrate AI into your app? With a single API, you get instant access to powerful language processing and machine learning capabilities.

The wide range of elevated mannequins available to builders offers unparalleled flexibility in selecting the perfect model for their specific needs and purposes. While mannequins undoubtedly introduce increased intricacy by their very nature. To mitigate this challenge, we’re simplifying the process for individual developers to explore different styles through our platform’s intuitive interface. With this singular API, GitHub developers can seamlessly access a comprehensive suite of capabilities, allowing them to effortlessly evaluate performance across diverse foundational models using a consistent and uniform approach, effortlessly shifting between models without modifying the underlying code.

The platform offers shoppers libraries in Europe and the Americas with support for C# and .NET imminent. This Software Development Kit (SDK) streamlines the integration of artificial intelligence into your applications by automating routine tasks such as authentication, security, and retries across various programming languages. You’ll get started immediately with these two samples.

Microsoft and GitHub have joined forces to provide a seamless integration between their platforms. With this new collaboration, organizations can easily migrate their GitHub Enterprise to the cloud using Microsoft Azure. This streamlined process enables businesses to benefit from the scalability, reliability, and cost-effectiveness of the cloud while maintaining control over their code repositories. By leveraging Azure’s infrastructure-as-a-code capabilities, teams can efficiently manage their GitHub Enterprise instances, ensuring a smooth transition with minimal disruption to their workflows. 

As part of this development, we’re now simplifying the process for companies to access GitHub Enterprise via Azure, seamlessly integrating GitHub’s cloud-based platform with Azure’s robust security and scalability features.

Organizations already possessing an active Azure subscription have seamless access to purchase GitHub merchandise through self-service, or directly through Microsoft Sales, or with the assistance of Microsoft Cloud Solution Providers, allowing for flexible seat management to optimize usage efficiently. What’s more, organizations meeting eligibility criteria can leverage Microsoft Azure’s Consumption-Based Commitment (MACC) and Azure Dedicated Low Cost (ACD) to realize potential savings. 

With Microsoft’s integration, corporations can swiftly create a GitHub instance and link it seamlessly with their existing Microsoft Entra ID, streamlining user administration and access management. With an Azure subscription, you have access to the necessary tools for building intelligent AI software, including comprehensive access to GitHub’s suite of services, such as repositories, Actions, Advanced Security, and Copilot. Building scalable AI functionality has never been more effortless and eco-friendly for construction teams with our comprehensive package providing everything needed to get started.

We invite you to explore the capabilities of our comprehensive, end-to-end growth expertise. New clients can explore our comprehensive suite of services by visiting our website. 

GitHub Enterprise in Azure portal webpage

We’re thrilled to see what you’ll build with GitHub and Azure. 

Wings, a popular food delivery brand, has taken to the skies by partnering with DoorDash to deliver orders in Melbourne, Australia via drones.

0

Following more than five years of consistently profitable drone operations within the state of Queensland, Australia, Wing’s drone delivery services have finally expanded to another key region. Wing, a drone delivery service affiliated with Google, announced its expansion into Melbourne in July 2024. Wing’s inaugural operations in Victoria, Australia are successfully underway.

Deliveries of The Wing are available to select homes within the Greater Melbourne area. Given the proposed operating radius for Wing’s services in Victoria, this development could potentially represent Wing’s largest authorized delivery zone in Australia thus far.

Wing has decided to partner with DoorDash for its Melbourne delivery operations. The first one took off in November 2022 in Logan, Australia? Wing’s Australian operations have historically been anchored in Logan, a significant metropolitan hub in the state of Queensland. Through this feature, eligible customers are empowered to place orders with certainty, effortlessly ordering drone-deliverable items directly within their trusted DoorDash app.

The rooftop of the Grand Plaza Mall in Logan, Queensland, Australia. Picture courtesy of Wing.

The innovative Melbourne expansion will replicate the existing model of drone deliveries currently in operation. Dubbed a “store-to-door” model, this concept has already proven successful. Wing, a pioneer in drone delivery, sets up its proprietary “drone nest” infrastructure in collaboration with a retail partner or procurement intermediary. Straightforwardly departing from that retailer or purchasing intermediary, drones bypass separate warehouses for shipping. Today we’re going to take a close look at.

The e-commerce platform Wing is expanding in Melbourne by introducing its first-ever physical store, dubbed a “Nest,” at the Eastland Shopping Centre in Ringwood, a Japanese-inspired suburb in Victoria, Australia. Considered one of Australia’s premier shopping destinations, this complex boasts a staggering 340-plus retail stores and establishments. The placement of these facilities will enable drone delivery access to more than 250,000 Melbourne-area residents.

The vastness of space and its untold business opportunities necessitate a heightened emphasis on self-governance. In many cases, automation enables a significant decrease in human reliance. According to Wing, their Melbourne operations enable a significant scale-up, allowing for a maximum of 50 drones to be monitored by just one pilot at any given moment, effectively achieving a drone-to-pilot ratio of 50:1. That represents a threefold improvement over the previous drone supply approvals granted by Wing.

As of 2024, wing drone deliveries are poised to revolutionize the logistics industry. With their ability to navigate through congested urban areas and reach remote locations, these drones have the potential to transform the way goods are transported.

Drones with wings are found outside a typical Walmart store. (Picture courtesy of Wing)

As Wing claimed in its July 2024 announcement, 2024 might well become the year of drone delivery.

Recent Wing drone supply chain advancements have seen the announcement of strategic partnerships with industry leaders, such as Apian, BlackRock Health, and St. Jude Children’s Research Hospital. Vincent’s Non-public Hospital, Medtronic. Firms are conducting a trial involving the delivery of various medical supplies and equipment by drone to hospitals across Dublin. While this relatively modest operation handles approximately 100 flights each week.

In the United States, wings of opportunity may begin to lift off. Walmart has officially introduced its Wingz delivery service at two locations in Texas: Arlington and Fort Worth. Wing and Walmart jointly deliver packages via drones from six hubs to over a dozen households within the Dallas-Fort Worth metropolitan area.

In the early stages of this year, Wing, a company known for its innovative delivery solutions, announced the expansion of their successful DoorDash partnership, which initially took root in Australia, to Christiansburg, Virginia. Eligible residents can opt for a sweet treat, such as a Frosty, or indulge in a savory favorite like the Baconator, when ordering from Wendy’s via DoorDash.

If you’ve never tried DoorDash before, you’re free to do so – whether or not that experience comes with drone delivery.

Drones are poised to revolutionize industries worldwide with cutting-edge advancements in their supply chain development in 2024.

In reality, Wing isn’t the sole company expanding its drone supply options this year. Additionally this month, we secured several crucial deals. Amazon is currently working to expand its existing drone delivery service in Faculty Station, Texas.

While Zipline continued to evolve, a significant milestone was achieved in April 2024 with the delivery of its first order to a discerning customer.

The DroneUp Ecosystem. (Picture courtesy of DroneUp)

Smaller game developers are making a significant impact through innovation. For instance, in 2024. The platform features standalone units, each measuring two parking areas, which function as compact bundle take-off and supply facilities. Drones from DroneUp can be deployed almost anywhere throughout a city. At the designated pickup location, customers can collect their drone-delivered items without physically interacting with the drone.