Your cart is currently empty!
Tag: top tech trends of the future
Geekom Mini IT13 Review | IT Pro
Geekom is another Chinese OEM carving out a name for itself in the Mini PC market. Unlike the mini PC boxes we’ve looked at recently from relative newcomers Acemagic and Beelink which are both entry level devices built around Intel’s N150 processor the Geekom Mini IT13 2025 Edition, to give it its full title, runs on the altogether more potent Core i9-13900HK CPU.
Naturally, that puts the new Geekom box into a different price category from its Twin Lake juniors. At the time of writing, Geekom is selling the 1TB model for £649 rather than the “usual” RRP of £849 and the 2TB model for £699 rather than, oddly, £799. It’s good to see a manufacturer not gouging the public for extra storage capacity. Certain famous computer makers with fruit logos could take note. Both models come with 32GB of RAM.
That price puts the Mini IT13 in direct competition with the likes of the Asus PN53 and Lenovo ThinkCentre M70q Gen 4 Tiny, though both those machines are bigger and heavier than the Geekom. What we have here, then, is a grown-up mini PC squeezed into the footprint of a small, budget mini PC.
Geekom Mini IT13: Design
(Image credit: Future)
The Geekon Mini IT13 2025 edition looks very much like the Mini IT13 which in turn bore a remarkable similarity to the IT12 and IT11. Clearly “if it ain’t broke, don’t fix it” is the order of the day and Geekom and I say “fair enough” to that because, as mini PCs go there is nothing much to criticise in the design.
In size and shape the Mini IT13 2025 is par for the NUC course, weighing 652g and measuring up at 117 x 112 x 49mm. The exterior is a solid metal box finished in an appealing grey-green paint with the makers name painted on the lid in white.
Naturally, given the diminutive size of the Mini IT13, the PSU is external, but the 120W rat-and-tail affair is small enough to be tucked away out of sight and mind and comes with a usefully long cable. Geekmon also bundles a VESA mounting bracket and an HDMI cable.
Geekom has done sterling work squeezing a wide selection of ports into the Mini IT13’s case and making full use of the chipsets 28 PCIe lanes to provide excellent levels of connectivity.
On the front panel along with the on/off switch you’ll find two 10Gbps USB-A ports and a 3.5mm combo audio jack, while on the left side, there is a full-sized SD card slot and on the right a Kensington security lock.
But it’s around the back that things get really busy. Here you’ll find two HDMI 2.0 ports, two USB-C 4.0 ports both supporting DisplayPort video, another 10Gbps USB-A port, a USB-A 2.0 port, a 2.5GbE Ethernet jack and the barrel jack for the PSU.
That’s a very snug arrangement, and removing things when all the ports are occupied involves taking some care, but you have to pat Geekom on the head for squeezing in the maximum number of connectors into such a small area.
Getting inside the Mini 13 is easy enough, just undo the four Philips screws that sit inside the rubber feet that are fixed to the base and pull the body up from the base. Be careful, though, because there’s a ribbon cable that connects the motherboard to the SATA3 connector that is attached to the base. The base plate also features a slide-in cradle for a 2.5-inch HDD, which makes installing said a cinch.
Once you’ve separated base from body, there is easy access to the two SODIMM slots as well as the occupied PCIe Gen 4 M.2 2280 and unoccupied 2240 SSD mounts. Our test box came with two 16GB RAM sticks fitted.
According to Geekom’s specification sheet, wireless communications are handled by an Intel AX211 card, but our unit had a MediaTek MT7992 component. Both cards support 6Ghz Wi-Fi 6E and Bluetooth 5.3 so we don’t regard this as a major cause for concern.
Geekom Mini IT13: Specs and Performance
The Core i9-13900HK chip inside the Mini IT13 is, of course, the 14-core, 20-thread mobile chip, here with a 65W maximum TDP, not the 125W, 24-core desktop model. The mobile i9 is still a strong performer though with 6 Performance cores and a maximum turbo clock of 5.4GHz.
The 2024 model of the Mini IT13 used the Core i9-13900H CPU which only gives away between 8 and 10 per cent in multi-thread performance so there’s really no need to upgrade if you have one of those on your desk.
The 2025 update of the Mini IT13 still uses DDR4 rather than DDR5 memory, despite the processor supporting the latter, which offers greater bandwidth and higher speed. A move to DDR5 would also boost the performance of the Iris Xe iGPU, which shares the 32GB of system memory.
(Image credit: Future)
In our standard 4K multi-media benchmark, the Mini IT13 scored 262 points. To put that into context, the Asus PN53, which is built around an 8-core AMD Ryzen 6900HX CPU with 32GB of DDR5 RAM, scored 298 points while Lenovo’s ThinkCentre M70q Gen 4 Tiny, which uses a desktop Core i7-13700T with 16GB of DDR4 RAM, scored 303. The 41-point difference between the Geekom and Lenovo machines would be very difficult to discern in everyday use.
In the GeekBench 6 CPU test, the Geekom and Lenovo machines ran neck-and-neck, the Mini IT13 scoring 2,694 single-core and 10,286 multi-core to the M70q’s 2,585 and 10,941. It was a similar story in the PCMark 10 test with the Lenovo just shading the Geekom box by 6,066 to 6,002.
Comparing the Asus, Lenovo and Geekom machines using the Cinebench R23 multi-core test, we get 11,345 vs. 12,914 vs. 12,127, respectively. Given that the Asus and Lenovo boxes are both bigger and heavier than the Geekom, this has to be seen as a good set of results for the diminutive Mini IT13.
The Xe graphics integrated GPU rather lets the side down as it simply can’t compete with the latest Arc and Radeon iGPUs from Intel and AMD. To put that into context, the SPECviewperf 3dsmax 3D modelling benchmark ran at a pedestrian 15fps. Intel’s Arc 140V iGPU can hit 25fps in the same test while AMD’s Radeon 890M can get close to 40fps.
The Radeon 680M iGPU in the Asus PN53 ran the same SPECviewperf test at 28fps, so if outright graphics performance is a requirement but you still fancy the look of the Mini IT13, it could be worth looking at the Geekom AX8 Pro which features an AMD Ryzen 7 8845HS CPU with Radeon 780M graphics.
Of course, you could always invest in an external GPU enclosure and connect it to the Mini IT13 via one of the 40Gpbs Type-C ports. That would theoretically turn it into a very potent graphics and gaming platform.
The 1TB Kingston SSD in our review unit turned in sequential read and write speeds of 3,312MB/s and 2,026MB/s, respectively, which is a pretty unremarkable level of performance, though sufficient for the kind of general computing jobs the Mini IT13 is likely to be pressed into.
The system is cooled by a single fan that sits above the motherboard. It runs very quietly even at full speed, but the absence of an air intake grille above the fan does seem to limit performance under extreme stress: After a 30-minute stress test, CPU utilisation dropped to 60 per cent indicating some thermal restrictions.
The Mini IT13 comes loaded with Windows 11 Pro, but I found that everything worked as it should when running Ubuntu 24.10, making this a good platform for anyone wanting to walk the open-source path. It’s a shame you can’t buy the Mini IT13 without an operating system preinstalled to save some money.
Geekom Mini IT13: Is it worth it?
Given the wide range of I/O ports and the ease with which you can add more memory and storage, it’s hard to argue with the Mini IT13’s value offering, especially at the current “offer” price direct from the manufacturer. Baseline performance is good too, easily matching the more well-known offerings we’ve tested from the likes of Asus and Lenovo.
Graphics performance does let the Mini IT13 down somewhat, but that’s more due to the leap forward that Intel has recently made with its integrated GPUs than any inherent fault with the chipset inside the Mini IT13. If you’re worried about buying from a relatively unknown name, Geekom advertises a 30-day money-back guarantee and a 3-year warranty.
Geekom Mini IT13 specifications
Swipe to scroll horizontallyProcessor
Intel Core i9-13900HK
Row 0 – Cell 2 GPU
Intel Iris Xe iGPU
Row 1 – Cell 2 RAM
32GB DDR4-3200
Row 2 – Cell 2 Ports
USB-C 4.0 x 2, USB-A 3.2 Gen 2 x 3, USB-A 2.0 x 1, HDMI 2.0 x 2, 2.5GbE RJ-45 x 1, SD card reader x 1, 3.5mm audio x 1
Row 3 – Cell 2 Storage
1TB M.2 2280 PCIe Gen 4, slots for an M.2 2242 SSD and 2.5-inch SATA HDD
Row 4 – Cell 2 Connectivity
Wi-Fi 6E, Bluetooth 5.3
Row 5 – Cell 2 Weight
652g
Row 6 – Cell 2 Dimensions
117 x 112 x 49mm
Row 7 – Cell 2 OS
Windows 11 Pro but Linux compatible
Row 8 – Cell 2 Price
Starting at £649
Row 9 – Cell 2 Chilkey ND75 LP Review: Impressive performance for $100
Why you can trust Tom’s Hardware
Our expert reviewers spend hours testing and comparing products and services so you can choose the best for you. Find out more about how we test.There aren’t a ton of low-profile mechanical keyboards on the market — after all, the best mechanical keyboards are about trying to achieve an amazing typing experience, and low-profile keyboards tend to be about compromising said experience for something slim, lightweight, and travel-friendly. But not everyone wants to travel with a paper-thin Apple Magic Keyboard, so it’s always nice to see a well-built low-profile board that delivers a fantastic typing experience — and it’s even nicer to see one with a sub-$100 price tag.
Chilkey’s ND75 LP is the brand’s popular ND75 keyboard in low-profile form, and it comes with all the bells and whistles: wireless, with a full-aluminum body, double-shot PBT keycaps, a hot-swappable PCB, and tri-mode wireless connectivity. It even has a little LCD screen that shows you the time, battery life, and various settings like system and Caps Lock (and can, of course, be configured to display a picture or gif of your choosing — because that’s important). The ND75 LP is a little heavy to be a travel-friendly low-profile keyboard, but it’s nice to have the option of traveling with something that prioritizes typing feel and sound over portability.
The ND75 LP is available now, for $99 (black and white versions) or $105 (color versions).
Design and Construction of the ND75 LP
The ND75 LP is a wireless low-profile mechanical keyboard with a 75-percent layout, which means it has arrow keys and a function row, but no number pad and only a few of the navigation keys (Del, Ins, PgUp, and PgDn).
It also features a small 1-inch screen on the right side, which shows the time, battery life, and connection status by default and can be used to configure some of the keyboard’s lighting effects. (You can also, of course, upload an image or gif to play on the screen, but we’ll get to that later.)
The ND75 LP is slim and low-profile, but it’s also hefty — it weighs a solid 2.88 pounds (1,305g), which is about 4.5 ounces heavier than the Asus ROG Azoth. It is slim, though, measuring just 1.05 inches (26.6mm) thick at the back and 0.37 inches (9.3mm) thick at the front. The keyboard is 12.68 inches (322mm) wide by 5.45 inches (138.5mm) deep, which makes it just slightly larger than the Nuphy Air75 V2 (12.5 x 5.2 x 0.59 inches / 316.4 x 132.5 x 13.5mm) — though it is, of course, 1.5 pounds heavier than the 1.31lb / 598g Air75 V2. It does have a roomier layout than the Air75 V2 — the function keys are separated into clusters of four, and the arrow keys are offset slightly from the alphanumeric keys.
The keyboard is so heavy because it features a fully aluminum case with a decorative keyboard weight on the back. The keyboard comes in six colors, starting at $99 for pure white and jet black (both of which come with black and white keycaps and black keyboard weights on the back). The more colorful options cost an extra $6: lavender, baby blue, silver, and milk tea (a light orange-beige color). These options all come with matching keycaps and silver keyboard weights on the back.
Our review unit came in baby blue, which has white alphanumeric keycaps with light blue printed legends, and light blue accent keys with white printed legends. It’s an attractive keyboard, with a finely-machined two-part case, thick, double-shot PBT keycaps, and concentric circles etched on the backplate for style.
The back of the keyboard features four small silicone anti-slip feet in addition to the backplate. The feet fit into the grove on the wrist rest, in the event you want to use the wrist rest as a keyboard stand to adjust the board’s typing angle from its standard 6.5 degrees to 10 degrees. This probably isn’t necessary, but it’s a nice touch, especially for people who shy away from full-aluminum mechanical keyboards because they’re concerned about not being able to change the typing angle. It’s not the most advanced solution, but it works well enough.
(Image credit: Tom’s Hardware) In the box, the ND75 LP comes with a handful of accessories, including a 5-foot rubber USB-C to USB-A cable, a dual keycap/switch puller, and a slim rubber wrist rest. It also comes with a screwdriver, three extra switches, a 2.4-GHz dongle, and the parts you’ll need if you want to switch the keyboard’s mounting system from gasket-mount to top-mount. The company also includes a replacement flexible flat cable, because you can pretty easily rip the one that connects the screen to the PCB if you yank the top cover off too aggressively.
Speaking of which, the ND75 LP’s case is tool-less. The top case is held on magnetically, so all you have to do to open up the keyboard is apply some pressure and pop it off (but not too far off, or that cable will rip). The magnets are fairly strong — I tossed this in my bag and went traveling with it, and not once was I worried the top case might separate or get jostled loose — but it pops off easily enough. (For what it’s worth, the flat cable that attaches the screen is pretty long — you’d be unlikely to accidentally rip it unless you just forgot that there was a screen altogether. Once inside, you can switch the keyboard’s mounting system using the included accessories, or, well, do whatever else you want before you pop the top back on.
Specs
Swipe to scroll horizontallySize
75%
Number of keys
80
Switches
Chilkey Aster (linear, low-profile)
Backlighting
Yes
Onboard Storage
Yes
Dedicated Media Keys
No
Game Mode
No
Additional Ports
0
Connectivity
2.4GHz wireless, Bluetooth 5.3, wired (USB-C)
Cable
5-ft, USB-C to USB-A
Keycaps
ABS
Construction
Plastic chassis Anodized aluminum top plate
Software
Chilkey Console
Dimensions (LxWxH)
12.68 x 5.45 x 1.05 inches / 322 x 138.5 x 26.6 mm
Weight
2.88lbs / 1,305g
MSRP / Price at Time of Review
$99 – $105
Release Date
Oct. 2024
Typing and Gaming Experience on the ND75 LP
The ND75 LP sounds and feels great out of the box — and not just for a budget-friendly, low-profile keyboard. The keyboard features Chilkey’s self-developed Aster switches, which are full POM linear switches with a total travel of 3mm — pretty close to the standard switch travel of 3.5 – 4mm.
The switches have an actuation force of 45g with a bottom-out force of 52g, and are rated for up to 50 million keystrokes. They’re super smooth, thanks to their pre-lubed full POM construction, and, combined with the premium double-shot PBT keycaps, they sound great. The board also features five layers of sound-dampening material inside, and the plate-mounted stabilizers are well-lubed, so you won’t get any hollowness or rattle.
The keycaps have an LSA profile — low-profile, with large, rounded tops that let you slip smoothly between keys while still giving you plenty of room to prevent typos. The rows aren’t sculpted, but I’m not sure that would do much on a low-profile keyboard like this, anyway. The keycaps have a smooth, lightly textured finish, and sound and feel premium. The keyboard does have backlighting, but the keycaps aren’t shine-through — so, while there’s enough light to give you a pretty lightshow, it’s not all that useful for actually seeing the keys, if that’s important to you.
This is a low-profile keyboard, so it’s fairly short in the front (0.37 inches / 9.3mm), but it also comes with a wrist rest… just in case. The wrist rest is small, and can either be used as wrist rest or as a way to angle the back of the keyboard toward you; I’m not sure it’s terribly useful either way, but it’s a nice inclusion — especially on a budget board — and it has a nice, soft rubbery feel.
(Image credit: Tom’s Hardware) The ND75 LP comes with a gasket-mount structure that’s flexible enough to be comfortable while still delivering crisp, thocky sound. But if you’re looking for even crisper, thockier sound, you might want to switch the board to a top-mount, which you can do by popping the top case off and using the screws Chilkey includes with the board to switch over. It’s a surprisingly easy board to tinker with — not that most boards are difficult, but the magnetic top case is a nice touch.
The ND75 LP features N-key rollover and a 1,000 Hz polling rate over both its wired and 2.4-GHz wireless connections, so while it’s not necessarily designed for gaming it will absolutely work in a pinch. Its low-profile linear switches are also excellent for gaming, as they’re quick and snappy and it’s easy to move around the board quickly. The board’s 75-percent layout also makes it a great gaming option, as it’s not so small you’ll be missing keys, but it’s also not so large you won’t be able to make big mouse swipes on a small desk or table.
Features and Software of the ND75 LP
The ND75 LP is configurable — to some extent — on the board itself using Fn shortcuts and the built-in screen. You can navigate through the screen with Fn + the plus/minus/enter keys, and you can do things like change the keyboard’s lighting effects, color, and brightness. You can also switch connections and system types from this screen. Of course, you can also do these things using Fn shortcuts — you don’t technically need the screen, it’s just a nice thing to be able to look at for confirmation.
As for keymapping, macro recordings, and putting the image or gif of your choice on the keyboard’s screen, you’ll need to use Chilkey’s online configuration software for that. The online software is fairly straightforward:
Connect your keyboard and you can remap keys (two layers), adjust the backlighting, and upload your own picture to the keyboard’s screen. There is a macro recorder, but otherwise the software is fairly basic — remapping is limited to keyboard and mouse functions (and macros), and lighting is limited to preset effects. But it does save directly to the board, and you can make up to three configurations.
(Image credit: Tom’s Hardware) While you can use the screen to switch between connections, you’ll probably just end up using the built-in shortcuts — Fn + Q, W, and E for Bluetooth, FN + R for 2.4Ghz wireless, and Fn + T for wired.
The power switch for wireless connectivity is located under the right shift key, which is a little annoying, especially if you were thinking of traveling with this keyboard. But this is perhaps not the most travel-friendly keyboard — it’s fairly heavy and there’s no place to store the tiny 2.4GHz wireless dongle, so you’ll need to depend on Bluetooth or a wire for connection when you’re on the road.
While this shouldn’t be too much of an issue, I definitely had some problems with the keyboard’s Bluetooth connection — specifically, whenever I connected to another Bluetooth device (such as a mouse or a headset), the board’s Bluetooth would disconnect and then be unable to reconnect for some reason.
This was frustrating mostly because I’d forgotten to bring all but one USB cord with me, so when I was trying to charge my other devices I would occasionally find the keyboard was just no longer connected to my laptop, and then I had to decide whether I was going to type on my laptop’s built-in keyboard or hope my mouse could work on a 5-minute charge.
On top of that, the board’s battery life is not great (especially given its weight). It has two 1,800 mAh batteries, but both the backlighting and the screen will drain those faster. I found the keyboard lasted about one full day of typing (8 – 10 hours), which is… well, not great. It almost makes me wonder if, given the weight and screen, this would have made more sense as a wired-only keyboard (perhaps it would have been cheaper, too).
The Bottom Line
The ND75 LP is a very impressive board for the price — it looks, sounds, and feels like a premium mechanical keyboard, features a customization-friendly magnetic case and hot-swappable PCB, and tri-mode wireless connectivity (sort of) — and it’s under $100 (unless you want it in a pretty color, in which case it’s $105). Other similar low-profile keyboards looking to deliver a premium typing experience, like the Lofree Edge and the Nuphy Air75 V2 are pricier (though they are lighter weight, thinner, and more travel-friendly) — and don’t sound as good.
That said, this isn’t the most travel-friendly keyboard, for more reasons than just its weight. The ND75 LP’s battery life is mediocre at best; its Bluetooth connectivity leaves something to be desired; and there’s nowhere to store the 2.4-GHz dongle. So if you’re traveling with it, it’ll mostly be a wired keyboard. It’s far from the thinnest or lightest low-profile keyboard, and while Chilkey’s Aster switches are excellent, they are the only option — it would be nice to see a tactile switch option, for that ultimate typing experience.
NOV CIO fused AI and Zero Trust to slash threats by 35x
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
National Oilwell Varco (NOV) is undergoing a sweeping cybersecurity transformation under CIO Alex Philips, embracing a Zero Trust architecture, strengthening identity defenses and infusing AI into security operations. While the journey is not complete, the results, by all accounts, are dramatic – a 35-fold drop in security events, the elimination of malware-related PC reimaging and millions saved by scrapping legacy “appliance hell” hardware.
VentureBeat recently sat down (virtually) for this in-depth interview where Philips details how NOV achieved these outcomes with Zscaler’s Zero Trust platform, aggressive identity protections and a generative AI “co-worker” for its security team.
He also shares how he keeps NOV’s board engaged on cyber risk amid a global threat landscape where 79% of attacks to gain initial access are malware-free, and adversaries can move from breach to break out in as little as 51 seconds.
Below are excerpts of Philips’ recent interview with VentureBeat:
VentureBeat: Alex, NOV went “all in” on Zero Trust a number of years ago – what were the standout gains?
Alex Philips: When we started, we were a traditional castle-and-moat model that wasn’t keeping up. We didn’t know what Zero Trust was, we just knew that we needed identity and conditional access at the core of everything. Our journey began by adopting an identity-driven architecture on Zscaler’s Zero Trust Exchange and it changed everything. Our visibility and protection coverage dramatically increased while simultaneously experiencing a 35x reduction in the number of security incidents. Before, our team was chasing thousands of malware incidents; now, it’s a tiny fraction of that. We also went from reimaging about 100 malware-infected machines each month to virtually zero now. That’s saved a considerable amount of time and money. And since the solution is cloud-based, Appliance hell is gone, as I like to say.
The zero trust approach now gives 27,500 NOV users and third parties policy-based access to thousands of internal applications, all without exposing those apps directly to the internet.
We were then able to take an interim step and re-architect our network to take advantage of internet-based connectivity vs. legacy expensive MPLS. “On average, we increased speed by 10–20x, reduced latency to critical SaaS apps, and slashed cost by over 4x… Annualized savings [from network changes] have already achieved over $6.5M,” Philips has noted of the project.
VB: How did shifting to zero trust actually reduce the security noise by such an enormous factor?
Philips: A big reason is that our internet traffic now goes through a Security Service Edge (SSE) with full SSL inspection, sandboxing, and data loss prevention. Zscaler peers directly with Microsoft, so Office 365 traffic got faster and safer – users stopped trying to bypass controls because performance improved. After being denied SSL inspection with on-prem equipment, we finally got legal approval to decrypt SSL traffic since the cloud proxy does not give NOV access to spy on the data itself. That means malware hiding in encrypted streams started getting caught before hitting endpoints. In short, we shrunk the attack surface and let good traffic flow freely. Fewer threats in meant fewer alerts overall.
John McLeod, NOV’s CISO, concurred that the “old network perimeter model doesn’t work in a hybrid world” and that an identity-centric cloud security stack was needed. By routing all enterprise traffic through cloud security layers (and even isolating risky web sessions via tools like Zscaler’s Zero Trust Browser), NOV dramatically cut down intrusion attempts. This comprehensive inspection capability is what enabled NOV to spot and stop threats that previously slipped through, slashing incident volumes by 35x.
VB: Were there any unforeseen benefits to adopting Zero Trust you didn’t initially expect?
Alex Philips: Yes, our users actually preferred the cloud-based Zero Trust experience over legacy VPN clients, so adoption was simple and gave us unprecedented agility for mobility, acquisitions, and even what we like to call “Black Swan Events”. For example, when COVID-19 hit, NOV was already prepared! I told my leadership team if all 27,500 of our users needed to work remotely, our IT systems could handle it. My leadership was stunned and our company kept moving forward without missing a beat.
VB: Identity-based attacks are on the rise – you’ve mentioned staggering stats about credential theft. How is NOV fortifying identity and access management?
Philips: Attackers know it’s often easier to log in with stolen credentials than to drop malware. In fact, 79% of attacks to gain initial access in 2024 were malware-free, relying on stolen credentials, AI-driven phishing, and deepfake scams, according to recent threat reports. One in three cloud intrusions last year involved valid credentials. We’ve tightened identity policies to make those tactics harder.
For example, we integrated our Zscaler platform with Okta for identity and conditional access checks. Our conditional access policies verify devices have our SentinelOne antivirus agent running before granting access, adding an extra posture check. We’ve also drastically limited who can perform password or MFA resets. No single admin should be able to bypass authentication controls alone. This separation of duties prevents an insider or compromised account from simply turning off our protections.
VB: You mentioned finding a gap even after disabling a user’s account. Can you explain?
Philips: We discovered that if you detect and disable a compromised user’s account, the attacker’s session tokens might still be active. It isn’t enough to reset passwords; you have to revoke session tokens to truly kick out an intruder. We’re partnering with a startup to create near real-time token invalidation solutions for our most commonly used resources. Essentially, we want to make a stolen token useless within seconds. A Zero Trust architecture helps because everything is re-authenticated through a proxy or identity provider, giving us a single choke point to cancel tokens globally. That way, even if an attacker grabs a VPN cookie or cloud session, they can’t move laterally because we’ll kill that token fast.
VB: How else are you securing identities at NOV?
Philips: We enforce multi-factor authentication (MFA) almost everywhere and monitor for abnormal access patterns. Okta, Zscaler, and SentinelOne together form an identity-driven security perimeter where each login and device posture is continuously verified. Even if someone steals a user password, they still face device checks, MFA challenges, conditional access rules, and the risk of instant session revocation if anything seems off. Resetting a password isn’t enough anymore — we must revoke session tokens instantly to stop lateral movement. That philosophy underpins NOV’s identity threat defense strategy.
VB: You’ve also been an early adopter of AI in cybersecurity. How is NOV leveraging AI and generative models in the SOC?
Philips: We have a relatively small security team for our global footprint, so we must work smarter. One approach is bringing AI “co-workers” into our security operations center (SOC). We partnered with SentinelOne and started using their AI security analyst tool—an AI that can write and run queries across our logs at machine speed. It’s been a game changer, allowing analysts to ask questions in plain English and get answers in seconds. Instead of manually crafting SQL queries, the AI suggests the next query or even auto-generates a report, which has dropped our mean time to respond.
We’ve seen success stories where threat hunts are performed up to 80% faster using AI assistants. Microsoft’s own data shows that adding generative AI can reduce incident mean time to resolution by 30%. Beyond vendor tools, we’re also experimenting with internal AI bots for operational analytics, using OpenAI foundational AI models to help non-technical staff quickly query data. Of course, we have data protection guardrails in place so these AI solutions don’t leak sensitive information.
VB: Cybersecurity is no longer just an IT issue. How do you engage NOV’s board and executives on cyber risk?
Philips: I made it a priority to bring our board of directors along on our cyber journey. They don’t need the deep technical minutiae, but they do need to understand our risk posture. With generative AI exploding, for example, I briefed them on both the advantages and risks early on. That education helps when I propose controls to prevent data leaks—there’s already alignment on why it’s necessary.
The board views cybersecurity as a core business risk now. They’re briefed on it at every meeting, not just once a year. We’ve even run tabletop exercises with them to show how an attack would play out, turning abstract threats into tangible decision points. That leads to stronger top-down support.
I make it a point to constantly reinforce the reality of cyber risk. Even with millions invested in our cybersecurity program, the risk is never fully eliminated. It is not if we will have an incident, but when.
VB: Any final advice, based on NOV’s journey, for other CIOs and CISOs out there?
Philips: First, recognize that security transformation and digital transformation go hand in hand. We couldn’t have moved to the cloud or enabled remote work so effectively without Zero Trust, and the business cost savings helped fund security improvements. It truly was a “win, win, win.”
Second, focus on the separation of duties in identity and access. No one person should be able to undermine your security controls—myself included. Small process changes like requiring two people to change MFA for an exec or highly privileged IT staff, can thwart malicious insiders, mistakes, and attackers.
Lastly, embrace AI carefully but proactively. AI is already a reality on the attacker side. A well-implemented AI assistant can multiply your team’s defense, but you must manage the risks of data leakage or inaccurate models. Make sure to merge AI output with your team’s skill to create an AI-infused “brAIn”.
We know the threats keep evolving, but with zero trust, strong identity security and now AI on our side, it helps give us a fighting chance.
AI has grown beyond human knowledge, says Google’s DeepMind unit
worawit chutrakunwanit/Getty Images The world of artificial intelligence (AI) has recently been preoccupied with advancing generative AI beyond simple tests that AI models easily pass. The famed Turing Test has been “beaten” in some sense, and controversy rages over whether the newest models are being built to game the benchmark tests that measure performance.
The problem, say scholars at Google’s DeepMind unit, is not the tests themselves but the limited way AI models are developed. The data used to train AI is too restricted and static, and will never propel AI to new and better abilities.
In a paper posted by DeepMind last week, part of a forthcoming book by MIT Press, researchers propose that AI must be allowed to have “experiences” of a sort, interacting with the world to formulate goals based on signals from the environment.
Also: With AI models clobbering every benchmark, it’s time for human evaluation
“Incredible new capabilities will arise once the full potential of experiential learning is harnessed,” write DeepMind scholars David Silver and Richard Sutton in the paper, Welcome to the Era of Experience.
The two scholars are legends in the field. Silver most famously led the research that resulted in AlphaZero, DeepMind’s AI model that beat humans in games of Chess and Go. Sutton is one of two Turing Award-winning developers of an AI approach called reinforcement learning that Silver and his team used to create AlphaZero.
The approach the two scholars advocate builds upon reinforcement learning and the lessons of AlphaZero. It’s called “streams” and is meant to remedy the shortcomings of today’s large language models (LLMs), which are developed solely to answer individual human questions.
Google DeepMind Silver and Sutton suggest that shortly after AlphaZero and its predecessor, AlphaGo, burst on the scene, generative AI tools, such as ChatGPT, took the stage and “discarded” reinforcement learning. That move had benefits and drawbacks.
Also: OpenAI’s Deep Research has more fact-finding stamina than you, but it’s still wrong half the time
Gen AI was an important advance because AlphaZero’s use of reinforcement learning was restricted to limited applications. The technology couldn’t go beyond “full information” games, such as Chess, where all the rules are known.
Gen AI models, on the other hand, can handle spontaneous input from humans never before encountered, without explicit rules about how things are supposed to turn out.
However, discarding reinforcement learning meant, “something was lost in this transition: an agent’s ability to self-discover its own knowledge,” they write.
Instead, they observe that LLMs “[rely] on human prejudgment”, or what the human wants at the prompt stage. That approach is too limited. They suggest that human judgment “imposes “an impenetrable ceiling on the agent’s performance: the agent cannot discover better strategies underappreciated by the human rater.
Not only is human judgment an impediment, but the short, clipped nature of prompt interactions never allows the AI model to advance beyond question and answer.
“In the era of human data, language-based AI has largely focused on short interaction episodes: e.g., a user asks a question and (perhaps after a few thinking steps or tool-use actions) the agent responds,” the researchers write.
“The agent aims exclusively for outcomes within the current episode, such as directly answering a user’s question.”
There’s no memory, there’s no continuity between snippets of interaction in prompting. “Typically, little or no information carries over from one episode to the next, precluding any adaptation over time,” write Silver and Sutton.
Also: The AI model race has suddenly gotten a lot closer, say Stanford scholars
However, in their proposed Age of Experience, “Agents will inhabit streams of experience, rather than short snippets of interaction.”
Silver and Sutton draw an analogy between streams and humans learning over a lifetime of accumulated experience, and how they act based on long-range goals, not just the immediate task.
“Powerful agents should have their own stream of experience that progresses, like humans, over a long time-scale,” they write.
Silver and Sutton argue that “today’s technology” is enough to start building streams. In fact, the initial steps along the way can be seen in developments such as web-browsing AI agents, including OpenAI’s Deep Research.
“Recently, a new wave of prototype agents have started to interact with computers in an even more general manner, by using the same interface that humans use to operate a computer,” they write.
The browser agent marks “a transition from exclusively human-privileged communication, to much more autonomous interactions where the agent is able to act independently in the world.”
Also: The Turing Test has a problem – and OpenAI’s GPT-4.5 just exposed it
As AI agents move beyond just web browsing, they need a way to interact and learn from the world, Silver and Sutton suggest.
They propose that the AI agents in streams will learn via the same reinforcement learning principle as AlphaZero. The machine is given a model of the world in which it interacts, akin to a chessboard, and a set of rules.
As the AI agent explores and takes actions, it receives feedback as “rewards”. These rewards train the AI model on what is more or less valuable among possible actions in a given circumstance.
The world is full of various “signals” providing those rewards, if the agent is allowed to look for them, Silver and Sutton suggest.
“Where do rewards come from, if not from human data? Once agents become connected to the world through rich action and observation spaces, there will be no shortage of grounded signals to provide a basis for reward. In fact, the world abounds with quantities such as cost, error rates, hunger, productivity, health metrics, climate metrics, profit, sales, exam results, success, visits, yields, stocks, likes, income, pleasure/pain, economic indicators, accuracy, power, distance, speed, efficiency, or energy consumption. In addition, there are innumerable additional signals arising from the occurrence of specific events, or from features derived from raw sequences of observations and actions.”
To start the AI agent from a foundation, AI developers might use a “world model” simulation. The world model lets an AI model make predictions, test those predictions in the real world, and then use the reward signals to make the model more realistic.
“As the agent continues to interact with the world throughout its stream of experience, its dynamics model is continually updated to correct any errors in its predictions,” they write.
Also: AI isn’t hitting a wall, it’s just getting too smart for benchmarks, says Anthropic
Silver and Sutton still expect humans to have a role in defining goals, for which the signals and rewards serve to steer the agent. For example, a user might specify a broad goal such as ‘improve my fitness’, and the reward function might return a function of the user’s heart rate, sleep duration, and steps taken. Or the user might specify a goal of ‘help me learn Spanish’, and the reward function could return the user’s Spanish exam results.
The human feedback becomes “the top-level goal” that all else serves.
The researchers write that AI agents with those long-range capabilities would be better as AI assistants. They could track a person’s sleep and diet over months or years, providing health advice not limited to recent trends. Such agents could also be educational assistants tracking students over a long timeframe.
“A science agent could pursue ambitious goals, such as discovering a new material or reducing carbon dioxide,” they offer. “Such an agent could analyse real-world observations over an extended period, developing and running simulations, and suggesting real-world experiments or interventions.”
Also: ‘Humanity’s Last Exam’ benchmark is stumping top AI models – can you do any better?
The researchers suggest that the arrival of “thinking” or “reasoning” AI models, such as Gemini, DeepSeek’s R1, and OpenAI’s o1, may be surpassed by experience agents. The problem with reasoning agents is that they “imitate” human language when they produce verbose output about steps to an answer, and human thought can be limited by its embedded assumptions.
“For example, if an agent had been trained to reason using human thoughts and expert answers from 5,000 years ago, it may have reasoned about a physical problem in terms of animism,” they offer. “1,000 years ago, it may have reasoned in theistic terms; 300 years ago, it may have reasoned in terms of Newtonian mechanics; and 50 years ago, in terms of quantum mechanics.”
The researchers write that such agents “will unlock unprecedented capabilities,” leading to “a future profoundly different from anything we have seen before.”
However, they suggest there are also many, many risks. These risks are not just focused on AI agents making human labor obsolete, although they note that job loss is a risk. Agents that “can autonomously interact with the world over extended periods of time to achieve long-term goals,” they write, raise the prospect of humans having fewer opportunities to “intervene and mediate the agent’s actions.”
On the positive side, they suggest, an agent that can adapt, as opposed to today’s fixed AI models, “could recognise when its behaviour is triggering human concern, dissatisfaction, or distress, and adaptively modify its behaviour to avoid these negative consequences.”
Also: Google claims Gemma 3 reaches 98% of DeepSeek’s accuracy – using only one GPU
Leaving aside the details, Silver and Sutton are confident the streams experience will generate so much more information about the world that it will dwarf all the Wikipedia and Reddit data used to train today’s AI. Stream-based agents may even move past human intelligence, alluding to the arrival of artificial general intelligence, or super-intelligence.
“Experiential data will eclipse the scale and quality of human-generated data,” the researchers write. “This paradigm shift, accompanied by algorithmic advancements in RL [reinforcement learning], will unlock in many domains new capabilities that surpass those possessed by any human.”
Silver also explored the subject in a DeepMind podcast this month.
Resist, eggheads! Universities are not as weak as they have chosen to be.
The wholesale American cannibalism of one of its own crucial appendages—the world-famous university system—has begun in earnest. The campaign is predictably Trumpian, built on a flagrantly pretextual basis and executed with the sort of vicious but chaotic idiocy that has always been a hallmark of the authoritarian mind.
At a moment when the administration is systematically waging war on diversity initiatives of every kind, it has simultaneously discovered that it is really concerned about both “viewpoint diversity” and “antisemitism” on college campuses—and it is using the two issues as a club to beat on the US university system until it either dies or conforms to MAGA ideology.
Reaching this conclusion does not require reading any tea leaves or consulting any oracles; one need only listen to people like Vice President JD Vance, who in 2021 gave a speech called “The Universities are the Enemy” to signal that, like every authoritarian revolutionary, he intended to go after the educated.
“If any of us want to do the things that we want to do for our country,” Vance said, “and for the people who live in it, we have to honestly and aggressively attack the universities in this country.” Or, as conservative activist Christopher Rufo put it in a New York Times piece exploring the attack campaign, “We want to set them back a generation or two.”
The goal is capitulation or destruction. And “destruction” is not a hyperbolic term; some Trump aides have, according to the same piece, “spoken privately of toppling a high-profile university to signal their seriousness.”
Consider, in just a few months, how many battles have been launched:
- The Trump administration is now snatching non-citizen university students, even those in the country legally, off the streets using plainclothes units and attempting to deport them based on their speech or beliefs.
- It has opened investigations of more than 50 universities.
- It has threatened grants and contracts at, among others, Brown ($510 million), Columbia ($400 million), Cornell ($1 billion), Harvard ($9 billion), Penn ($175 million), and Princeton ($210 million).
- It has reached a widely criticized deal with Columbia that would force Columbia to change protest and security policies but would also single out one academic department (Middle Eastern, South Asian, and African Studies) for enhanced scrutiny. This deal didn’t even get Columbia its $400 million back; it only paved the way for future “negotiations” about the money. And the Trump administration is potentially considering a consent decree with Columbia, giving it leverage over the school for years to come.
- It has demanded that Harvard audit every department for “viewpoint diversity,” hiring faculty who meet the administration’s undefined standards.
- Trump himself has explicitly threatened to revoke Harvard’s tax-exempt nonprofit status after it refused to bow to his demands. And the IRS looks ready to do it.
- The government has warned that it could choke off all international students—an important diplomatic asset but also a key source of revenue—at any school it likes.
- Ed Martin—the extremely Trumpy interim US Attorney for Washington, DC—has already notified Georgetown that his office will not hire any of that school’s graduates if the school “continues to teach and utilize DEI.”
What’s next? Project 2025 lays it out for us, envisioning the federal government getting heavily involved in accreditation—thus giving the government another way to bully schools—and privatizing many student loans. Right-wing wonks have already begun to push for “a never-ending compliance review” of elite schools’ admissions practices, one that would see the Harvard admissions office filled with federal monitors scrutinizing every single admissions decision. Trump has also called for “patriotic education” in K–12 schools; expect similar demands of universities, though probably under the rubrics of “viewpoint discrimination” and “diversity.”
Universities may tell themselves that they would never comply with such demands, but a school without accreditation and without access to federal funds, international students, and student loan dollars could have trouble surviving for long.
Some of the top leaders in academia are ringing the alarm bells. Princeton’s president, Christopher Eisgruber, wrote a piece in The Atlantic warning that the Trump administration has already become “the greatest threat to American universities since the Red Scare of the 1950s. Every American should be concerned.”
Lee Bollinger, who served as president of both the University of Michigan and Columbia University, gave a fiery interview to the Chronicle of Higher Education in which he said, “We’re in the midst of an authoritarian takeover of the US government… We cannot get ourselves to see how this is going to unfold in its most frightening versions. You neutralize the branches of government; you neutralize the media; you neutralize universities, and you’re on your way. We’re beginning to see the effects on universities. It’s very, very frightening.”
But for the most part, even though faculty members have complained and even sued, administrators have stayed quiet. They are generally willing to fight for their cash in court—but not so much in the court of public opinion. The thinking is apparently that there is little to be gained by antagonizing a ruthless but also chaotic administration that just might flip the money spigot back on as quickly as it was shut off. (See also: tariff policy.)
This academic silence also comes after many universities course-corrected following years of administrators weighing in on global and political events outside a school’s basic mission. When that practice finally caused problems for institutions, as it did following the Gaza/Israel fighting, numerous schools adopted a posture of “institutional neutrality” and stopped offering statements except on core university concerns. This may be wise policy, but unfortunately, schools are clinging to it even though the current moment could not be more central to their mission.
To critics, the public silence looks a lot like “appeasement”—a word used by our sister publication The New Yorker to describe how “universities have cut previously unthinkable ‘deals’ with the Administration which threaten academic freedom.” As one critic put it recently, “still there is no sign of organized resistance on the part of universities. There is not even a joint statement in defense of academic freedom or an assertion of universities’ value to society.”
Even Michael Roth, the president of Wesleyan University, has said that universities’ current “infatuation with institutional neutrality is just making cowardice into a policy.”
Appeasing narcissistic strongmen bent on “dominance” is a fool’s errand, as is entering a purely defensive crouch. Weakness in such moments is only an invitation to the strongman to dominate you further. You aren’t going to outlast your opponent when the intended goal appears to be not momentary “wins” but the weakening of all cultural forces that might resist the strongman. (See also: Trump’s brazen attacks on major law firms and the courts.)
As an Atlantic article put it recently, “Since taking office, the Trump administration has been working to dismantle the global order and the nation’s core institutions, including its cultural ones, to strip them of their power. The future of the nation’s universities is very much at stake. This is not a challenge that can be met with purely defensive tactics.”
The temperamental caution of university administrators means that some can be poor public advocates for their universities in an age of anger and distrust, and they may have trouble finding a clear voice to speak with when they come under thundering public attacks from a government they are more used to thinking of as a funding source.
But the moment demands nothing less. This is not a breeze; this is the whirlwind. And it will leave a state-dependent, nationalist university system in its wake unless academia arises, feels its own power, and non-violently resists.
Fighting back
Finally, on April 14, something happened: Harvard decided to resist in far more public fashion. The Trump administration had demanded, as a condition of receiving $9 billion in grants over multiple years, that Harvard reduce the power of student and faculty leaders, vet every academic department for undefined “viewpoint diversity,” run plagiarism checks on all faculty, share hiring information with the administration, shut down any program related to diversity or inclusion, and audit particular departments for antisemitism, including the Divinity School. (Numerous Jewish groups want nothing to do with the campaign, writing in an open letter that “our safety as Jews has always been tied to the rule of law, to the safety of others, to the strength of civil society, and to the protection of rights and liberties for all.”)
If you think this sounds a lot like government control, giving the Trump administration the power to dictate hiring and teaching practices, you’re not alone; Harvard president Alan Garber rejected the demands in a letter, saying, “The university will not surrender its independence or relinquish its constitutional rights. Neither Harvard nor any other private university can allow itself to be taken over by the federal government.”
The Trump administration immediately responded by cutting billions in Harvard funding, threatening the university’s tax-exempt status, and claiming it might block international students from attending Harvard.
Perhaps Harvard’s example will provide cover for other universities to make hard choices. And these are hard choices. But Columbia and Harvard have already shown that the only way you have a chance at getting the money back is to sell whatever soul your institution has left.
Given that, why not fight? If you have to suffer, suffer for your deepest values.
Fare forward
“Resistance” does not mean a refusal to change, a digging in, a doubling down. No matter what part of the political spectrum you inhabit, universities—like most human institutions—are “target-rich environments” for complaints. To see this, one has only to read about recent battles over affirmative action, the Western canon, “legacy” admissions, the rise and fall of “theory” in the humanities, Gaza/Palestine protests, the “Varsity Blues” scandal, critiques of “meritocracy,” mandatory faculty “diversity statements,” the staggering rise in tuition costs over the last few decades, student deplatforming of invited speakers, or the fact that so many students from elite institutions cannot imagine a higher calling than management consulting. Even top university officials acknowledge there are problems.
Famed Swiss theologian Karl Barth lost his professorship and was forced to leave Germany in 1935 because he would not bend the knee to Adolf Hitler. He knew something about standing up for one’s academic and spiritual values—and about the importance of not letting any approach to the world ossify into a reactionary, bureaucratic conservatism that punishes all attempts at change or dissent. The struggle for knowledge, truth, and justice requires forward movement even as the world changes, as ideas and policies are tested, and as cultures develop. Barth’s phrase for this was “Ecclesia semper reformanda est”—the church must always be reformed—and it applies just as well to the universities where he spent much of his career.
As universities today face their own watershed moment of resistance, they must still find ways to remain intellectually curious and open to the world. They must continue to change, always imperfectly but without fear. It is important that their resistance not be partisan. Universities can only benefit from broad-based social support, and the idea that they are fighting “against conservatives” or “for Democrats” will be deeply unhelpful. (Just as it would be if universities capitulated to government oversight of their faculty hires or gave in to “patriotic education.”)
This is difficult when one is under attack, as the natural reaction is to defend what currently exists. But the assault on the universities is about deeper issues than admissions policies or the role of elite institutions in American life. It is about the rule of law, freedom of speech, scientific research, and the very independence of the university—things that should be able to attract broad social and judicial support if schools do not retreat into ideology.
Why it matters
Ars Technica was founded by grad students and began with a “faculty model” drawn from universities: find subject matter experts and turn them loose to find interesting stories in their domains of expertise, with minimal oversight and no constant meetings.
From Minnesota Bible colleges to the halls of Harvard, from philosophy majors to chemistry PhDs, from undergrads to post-docs, Ars has employed people from a wide range of schools and disciplines. We’ve been shaped by the university system, and we cover it regularly as a source of scientific research and computer science breakthroughs. While we differ in many ways, we recognize the value of a strong, independent, mission-focused university system that, despite current flaws, remains one of America’s storied achievements. And we hope that universities can collectively find the strength to defend themselves, just as we in the media must learn to do.
The assault on universities and on the knowledge they produce has been disorienting in its swiftness, animus, and savagery. But universities are not starfish, flopping about helplessly on a beach while a cruel child slices off their arms one by one. They can do far more than hope to survive another day, regrowing missing limbs in some remote future. They have real power, here and now. But they need to move quickly, they need to move in solidarity, and they need to use the resources that they have, collectively, assembled.
Because, if they aren’t going to use those resources when their very mission comes under assault, what was the point of gathering them in the first place?
Here are a few of those resources.
Money
Cash is not always the most important force in human affairs, but it doesn’t hurt to have a pile of it when facing off against a feral US government. When the government threatened Harvard with multiyear cuts of $9 billion, for instance, it was certainly easier for the university to resist while sitting on a staggering $53 billion endowment. In 2024, the National Association of College and University Business Officers reported that higher ed institutions in the US collectively have over $800 billion in endowment money.
It’s true that many endowment funds are donor-restricted and often invested in non-liquid assets, making them unavailable for immediate use or to bail out university programs whose funding has been cut. But it’s also true that $800 billion is a lot of money—it’s more than the individual GDP of all but two dozen countries.
No trustee of this sort of legacy wants to squander an institution’s future by spending money recklessly, but what point is there in having a massive endowment if it requires your school to become some sort of state-approved adjunct?
Besides, one might choose not to spend that money now only to find that it is soon requisitioned regardless. People in Trump’s orbit have talked for years about placing big new taxes on endowment revenue as a way of bringing universities to heel. Trump himself recently wrote on social media that Harvard “perhaps” should “lose its Tax Exempt Status and be Taxed as a Political Entity if it keeps pushing political, ideological, and terrorist inspired/supporting “Sickness?” Remember, Tax Exempt Status is totally contingent on acting in the PUBLIC INTEREST!”
So spend wisely, but do spend. This is the kind of moment such resources were accumulated to weather.
Students
Fifteen million students are currently enrolled in higher education across the country. The total US population is 341 million people. That means students comprise over 4 percent of the total population; when you add in faculty and staff, higher education’s total share of the population is even greater.
So what? Political science research over the last three decades looked at nonviolent protest movements and found that they need only 3.5 percent of the population to actively participate. Most movements that hit that threshold succeed, even in authoritarian states. Higher ed alone has those kinds of numbers.
Students are not a monolith, of course, and many would not participate—nor should universities look at their students merely as potential protesters who might serve university interests. But students have been well-known for a willingness to protest, and one of the odd features of the current moment has been that so many students protested the Gaza/Israel conflict even though so few have protested the current government assault on the very schools where they have chosen to spend their time and money. It is hard to say whether both schools and their students are burned out from recent, bruising protests, or whether the will to resist remains.
But if it does, the government assault on higher education could provoke an interesting realignment of forces: students, faculty, and administrators working together for once in resistance and protest, upending the normal dynamics of campus movements. And the numbers exist to make a real national difference if higher ed can rally its own full range of resources.
Institutions
Depending on how you count, the US has around 4,000 colleges and universities. The sheer number and diversity of these institutions is a strength—but only if they can do a better job working together on communications, lobbying, and legal defenses.
Schools are being attacked individually, through targeted threats rather than broad laws targeting all higher education. And because schools are in many ways competitors rather than collaborators, it can be difficult to think in terms of sharing resources or speaking with one voice. But joint action will be essential, given that many smaller schools are already under economic pressure and will have a hard time resisting government demands, losing their nonprofit status, or finding their students blocked from the country or cut off from loan money.
Plenty of trade associations and professional societies exist within the world of higher education, of course, but they are often dedicated to specific tasks and lack the public standing and authority to make powerful public statements.
Faculty/alumni
The old stereotype of the out-of-touch, tweed-wearing egghead, spending their life lecturing on the lesser plays of Ben Jonson, is itself out of touch. The modern university is stuffed with lawyers, data scientists, computer scientists, cryptographers, marketing researchers, writers, media professionals, and tech policy mavens. They are a serious asset, though universities sometimes leave faculty members to operate so autonomously that group action is difficult or, at least, institutionally unusual. At a time of crisis, that may need to change.
Faculty are an incredible resource because of what they know, of course. Historians and political scientists can offer context and theory for understanding populist movements and authoritarian regimes. Those specializing in dialogue across difference, or in truth and reconciliation movements, or in peace and conflict studies, can offer larger visions for how even deep social conflicts might be transcended. Communications professors can help universities think more carefully about articulating what they do in the public marketplace of ideas. And when you are on the receiving end of vindictive and pretextual legal activity, it doesn’t hurt to have a law school stuffed with top legal minds.
But faculty power extends beyond facts. Relationships with students, across many years, are a hallmark of the best faculty members. When generations of those students have spread out into government, law, and business, they make a formidable network.
Universities that realize the need to fight back already know this. Ed Martin, the interim US Attorney for the District of Columbia, attacked Georgetown in February and asked if it had “eliminated all DEI from your school and its curriculum?” He ended his “clarification” letter by claiming that “no applicant for our fellows program, our summer internship, or employment in our office who is a student or affiliated with a law school or university that continues to teach and utilize DEI will be considered.”
When Georgetown Dean Bill Treanor replied to Martin, he did not back down, noting Martin’s threat to “deny our students and graduates government employment opportunities until you, as Interim United States Attorney for the District of Columbia, approve of our curriculum.” (Martin himself had managed to omit the “interim” part of his title.) Such a threat would violate “the First Amendment’s protection of a university’s freedom to determine its own curriculum and how to deliver it.”
There was no “negotiating” here, no attempt to placate a bully. Treanor barely addressed Martin’s questions. Instead, he politely but firmly noted that the inquiry itself was illegitimate, even under recent Supreme Court jurisprudent and Trump Department of Education policy. And he tied everything in his response to the university’s mission as a Jesuit school committed to “intellectual, ethical, and spiritual understanding.”
The letter’s final paragraph, in which Treanor told Martin that he expected him to back down from his threats, opened with a discussion of Georgetown’s faculty.
Georgetown Law has one of the preeminent faculties in the country, fostering groundbreaking scholarship, educating students in a wide variety of perspectives, and thriving on the robust exchange of ideas. Georgetown Law faculty have educated world leaders, members of Congress, and Justice Department officials, from diverse backgrounds and perspectives.
Implicit in these remarks are two reminders:
- Georgetown is home to many top legal minds who aren’t about to be steamrolled by a January 6 defender whose actions in DC have already been so comically outrageous that Sen. Adam Schiff has placed a hold on his nomination to get the job permanently.
- Georgetown faculty have good relationships with many powerful people across the globe who are unlikely to sympathize with some legal hack trying to bully their alma mater.
The letter serves as a good reminder: Resist with firmness and rely on your faculty. Incentivize their work, providing the time and resources to write more popular-level distillations of their research or to educate alumni groups about the threats campuses are facing. Get them into the media and onto lecture hall stages. Tap their expertise for internal working groups. Don’t give in to the caricatures but present a better vision of how faculty contribute to students, to research, and to society.
Real estate
Universities collectively possess a real estate portfolio of land and buildings—including lecture halls, stages, dining facilities, stadiums, and dormitories—that would make even a developer like Donald Trump salivate. It’s an incredible resource that is already well-used but might be put toward purposes that meet the moment even more clearly.
Host more talks, not just on narrow specialty topics, but on the kinds of broad-based political debates that a healthy society needs. Make the universities essential places for debate, discussion, and civic organizing. Encourage more campus conferences in summer, with vastly reduced rates for groups that effectively aid civic engagement, depolarization, and dialogue across political differences. Provide the physical infrastructure for fruitful cross-party political encounters and anti-authoritarian organizing. Use campuses to house regional and national hubs that develop best practices in messaging, legal tactics, local outreach, and community service from students, faculty, and administrators.
Universities do these things, of course; many are filled with “dialogue centers” and civic engagement offices. But many of these resources exist primarily for students; to survive and thrive, universities will need to rebuild broader social confidence. The other main criticism is that they can be siloed off from the other doings of the university. If “dialogue” is taken care of at the “dialogue center,” then other departments and administrative units may not need to worry about it. But with something as broad and important as “resistance,” the work cannot be confined to particular units.
With so many different resources, from university presses to libraries to lecture halls, academia can do a better job at making its campuses useful both to students and to the surrounding community—so long as the universities know their own missions and make sure their actions align with them.
Athletics
During times of external stress, universities need to operate more than ever out of their core, mission-driven values. While educating the whole person, mentally and physically, is a worthy goal, it is not one that requires universities to submit to a Two Minutes Hate while simultaneously providing mass entertainment and betting material for the gambling-industrial complex.
When up against a state that seeks “leverage” of every kind over the university sector, realize that academia itself controls some of the most popular sports competitions in America. That, too, is leverage, if one knows how to use it.
Such leverage could, of course, be Trumpian in its own bluntness—no March Madness tournament, for instance, so long as thousands of researchers are losing their jobs and health care networks are decimated and the government is insisting on ideological control over hiring and department makeup. (That would certainly be interesting—though quite possibly counterproductive.)
But universities might use their control of NCAA sporting events to better market themselves and their impact—and to highlight what’s really happening to them. Instead, we continue to get the worst kinds of anodyne spots during football and basketball games: frisbee on the quad, inspiring shots of domes and flags, a professor lecturing in front of a chalkboard.
Be creative! But do something. Saying and doing nothing—letting the games go on without comment as the boot heel comes down on the whole sector, is a complete abdication of mission and responsibility.
DOD and cyber research
The Trump administration seems to believe that it has the only thing people want: grant funding. It seems not even to care if broader science funding in the US simply evaporates, if labs close down, or if the US loses its world-beating research edge.
But even if “science” is currently expendable, the US government itself relies heavily on university researchers to produce innovations required by the Department of Defense and the intelligence community. Cryptography, cybersecurity tools, the AI that could power battlefield drone swarms—much of it is produced by universities under contract with the feds. And there’s no simple, short-term way for the government to replace this system.
Even other countries believe that US universities do valuable cyber work for the federal government; China just accused the University of California and Virginia Tech of aiding in an alleged cyberattack by the NSA, for instance.
That gives the larger universities—the one who often have these contracts—additional leverage. They should find a way to use it.
Medical facilities
Many of the larger universities run sprawling and sophisticated health networks that serve whole communities and regions; indeed, much of the $9 billion in federal money at issue in the Harvard case was going to Harvard’s medical system of labs and hospitals.
If it seems unthinkable to you that the US government would treat the health of its own people as collateral damage in a war to become the Thought Police, remember that this is the same administration that has already tried to stop funds to the state of Maine—funds used to “feed children and disabled adults in schools and care settings across the state”—just because Maine allowed a couple of transgender kids to play on sports teams. What does the one have to do with the other? Nothing—except that the money provides leverage.
But health systems are not simply weapons for the Trump administration to use by refusing or delaying contracts, grants, and reimbursements. Health systems can improve people’s lives in the most tangible of ways. And that means they ought to be shining examples of community support and backing, providing a perfect opportunity to highlight the many good things that universities do for society.
Now, to the extent that these health care systems in the US have suffered from the general flaws of all US health care—lack of universal coverage leading to medical debt and the overuse of emergency rooms by the indigent, huge salaries commanded by doctors, etc.—the Trump war on these systems and on the universities behind them might provide a useful wake-up call from “business as usual.” Universities might use this time to double down on mission-driven values, using these incredible facilities even more to extend care, to lower barriers, and to promote truly public and community health. What better chance to show one’s city, region, and state the value of a university than massively boosting free and easy access to mental and physical health resources? Science research can be esoteric; saving someone’s body or mind is not.
Conclusion
This moment calls out for moral clarity and resolve. It asks universities to take their mission in society seriously and to resist being co-opted by government forces.
But it asks something of all of us, too. University leaders will make their choices, but to stand strong, they need the assistance of students, faculty, and alumni. In an age of polarization, parts of society have grown skeptical about the value of higher education. Some of these people are your friends, family, and neighbors. Universities must continue to make changes as they seek to build knowledge and justice and community, but those of us no longer within their halls and quads also have a part to play in sharing a more nuanced story about the value of the university system, both to our own lives and to the country.
If we don’t, our own degrees may be from institutions that have become almost unrecognizable.
Lost Records: Bloom and Rage review: punk rock never dies
Lost Records: Bloom and Rage
MSRP $40.00
“Lost Records: Bloom and Rage pays tribute to 90s angst and the riot grrrl rock in a deeply moving coming of age story.”
Pros
- Natural dialogue flow
- Authentic camcorder hook
- Killer soundtrack
- Fantastic coming of age story
Cons
- Takes a bit to get going
- Supernatural mystery falls flat
When you grow up in a small town, punk rock isn’t just music: It’s a lifeline. Fuzzed out guitars blaring out of garages become the soundtrack of rebellion. It’s the music that the cops tell you to turn down, that your parents can’t stand, that your politicians try to demonize. It is loud. It is antagonistic. And in Lost Records: Bloom and Rage, it is freedom.
Set against the backdrop of 90s angst, the latest game from the creators of Life is Strange pays its respects to a riot grrrl movement that saved a generation. The narrative adventure tells a coming of age story about four teenage girls struggling find themselves in the confines of a suffocating town. It’s a jail cell where greasy locals play the role of guards, and the wailing guitars of Bratmobile’s Love Thing are enough to inspire a prison break.
You can’t lock us in here forever. The bars won’t hold us. We’ll chew through them. And then eat you alive.
Lost Records: Bloom and Rage is a mature reinvention of the Life is Strange formula with an impressive dynamic range of emotions. It’s a slow burn, one that struggles to find the right balance between grounded realism and supernatural intrigue, but its heart thumps like a bass drum in the dead of night.
The dream of the 90s
Lost Records tells its mysterious story across two generations. In the present day, Swann returns to her hometown to reunite with a group of childhood friends that she hasn’t seen in decades. We begin to uncover why that is in a series of flashbacks to their days as rebellious kids in the 90s. In that story, Swann moves to town and connects with Nora, Kat, and Autumn. The quartet spend a formative summer bonding with one another over punk rock and transforming an abandoned shack into a safe hideaway from the dull town they can’t wait to break free from. It’s a sincere coming of age story about self discovery, queer identity, and learning what’s worth fighting back against. All of that happens in the shadow of a simmering supernatural mystery radiating from a glowing abyss in the woods.
To tell that story, Don’t Nod employs the signature narrative hooks that defined Life is Strange. It’s a narrative filled with tough choices that lead to branching paths that shape where everything goes in both the past and present. There are several new tweaks to that formula, though, which go a long way. Choices, for instance, feel more natural here. They aren’t big, signposted moments that make it clear that players are facing a defining moment of the playthrough. I only realized how much my decisions had changed the story once I was finished and saw how many permutations of the story were possible. Lost Records feels more natural for it. Our lives and relationships are shaped just as much by the unassuming moments as they are the big choices.
Lost Records creates plenty of quiet moments that make all the noise feel worthwhile.
That idea is baked into the dialogue system, which isn’t just about choosing what to say next from a list of options. Don’t Nod encourages players to actually listen to the people they are talking to rather than focus solely on their responses. I’m often given a set of two or three dialogue options during conversations. If I’m impatient, I can choose one to butt into a conversation before my friends are done talking. But in some cases, a different dialogue option will pop up the longer I let the other person talk. That’s counterbalanced by the fact that I only get a short amount of time to say some respondes, otherwise my silence might be misinterpreted. That creates a great tension, as I need to balance being an active listener and saying what I really mean without hesitation. It better encapsulates the tricky nuances of communication, especially for a teenager trying to find her voice while not trying to embarrass herself in front of the cool girls.
That natural touch is present in Lost Records’ best idea: its camcorder. Swann isn’t a musician like her friends, but rather a budding videographer who is always carrying a camera with her. While exploring between dialogue sequences, I can break out my camera and film everything from birds to scenic landscapes. It’s a clever stand-in for traditional collectibles that reinforce Swann’s desire to document the world around her.
Don’t Nod As someone who used to film on mini DV camcorders all the time as a kid, it’s a remarkably authentic recreation. My footage gets a grainy filter pulled straight from the era and I can use my DualSense’s gyroscope on PS5 to add natural handheld shake to it. The camera even continues filming for a half a second or so after I hit record, leading to shots that end in a quick pan down to my feet before the cut, just as so many of my real life shots used to.
Small touches like that create a more tangible vision of the 90s rather than one that panders to hollow nostalgia. It wasn’t all just Furbys and Moon Shoes. It was a time defined by angst, leading to a counter-culture revolution that birthed fierce bands like Sleater-Kinney. I can feel the unrest of the era as songs by riot grrrl legends like Babes in Toyland soundtrack Swann’s development. That punk spirit is balanced out by moments of peace and tenderness, as I spend summer lounging in the woods with my friends. The evocative visuals so effectively capture the warmth that I can practically hear the mosquitos buzzing in my ears and feel the sun on my skin. Rebellion is motivated by the belief that the world can be better; Lost Records creates plenty of quiet moments that make all the noise feel worthwhile.
Growth through rebellion
Those gameplay systems create a backbone for Lost Records’ fantastic story, though it’s one that requires a lot of patience and trust. The narrative is split into two “tapes,” dubbed Bloom and Rage respectively. That episodic split is a bit misleading, as it creates the sense that the story is going to be filled with cliffhangers and twists like Life is Strange before it. That’s not the case, and it makes the first half hard to totally grapple with initially. In actuality, Lost Records is a slow-burn coming of age story that’s just as comfortable watching its cast lounge in the woods as it is teasing out a supernatural mystery.
The two parts should be taken less as TV episodes and more as one complete arc divided by a key emotional turn. The nuance is in the naming. Bloom is a fitting title for Tape 1 as it’s largely focused on the girls growing alongside one another. Swann begins the chapter as a shy kid who struggles with body image issues, but she slowly starts to find herself through days spent documenting her friends’ messy garage jams. Player choice helps make that feel more authentic. In my playthrough, I wanted to start a romance with Nora, but I was intimidated. Nora is the definition of 90s cool, a spitting image of Kathleen Hanna. I felt too shy to pursue obvious flirts initially. It took time for me to test the waters through the story, eventually gaining the confidence to make a move after lots of careful prodding. The moment where it all came together didn’t feel mechanical, achieved through an optimized dialogue path; it felt like Swann landed exactly where she belonged on her terms.
Tragedy does not invalidate all the love and joy we experience.
Just as important as the girls’ relationships to one another is their relationship to rebellion. In Bloom, it’s an act of play. A garage becomes a secret base where they can shout their lungs out in peace. Their hideout in the woods almost feels like an imaginary place. Punk rock is a dress up game. The more they embrace the riot grrrl ethos, the more they accept that it’s not something they have to keep a secret. It all culminates in Bloom’s climax, a pop-up punk show meant to cause a visible disruption in their small town.
Then comes Rage.
Reality sets in as Tape 2 begins, taking the story in an unexpected, sobering direction. It’s easy to rage against the machine by shredding, but a revelation about a character’s health puts the girls in a fight that they can’t win as easily. Their frustration begins to boil over as they scream at a monster with no ears. The innocence and joy of the first half gives way to vandalism and arson as the quartet tries to push back against the forces of life and death in any way they can. It’s a powerful expression of raw anger, which makes it all the more disruptive when the story detours into a supernatural, neon-soaked climax that needlessly teases a sequel. Those otherworldly elements are more effective when they’re used as backburner metaphors for the girls’ angst, which deepens like a never ending abyss.
It’s only once we emerge from Tape 2’s big revelation that Lost Records really pays off its slow build. That’s when the girls, now fully formed adults who have gone their separate ways, can reflect on what that period in their life really meant to them. It wasn’t just the moments of bliss that were formative, but the anger and sorrow too. Tragedy does not invalidate all the love and joy we experience; it sharpens those feelings and makes the people who help us get through it all the more precious.
Don’t Nod I think back to my own days as a punk rocker in a small town. Late in my high school years, I was a bassist for a band called Aguasaurus. What began as a bunch of unskilled musicians covering Creep to a crowd of our friends soon became an outlet for pushing our town out of its comfort zone. We showed up to an acoustic coffee house show with a fully electric setup and thrashed. We played a set at our town’s summer student music festival where we played the same song seven times. During one set, we simply got on stage, played a recording of a DMX song, and then left. We thought it was a rebellion against our boring classmates and teachers, but it was about pushing ourselves more than anything. It helped us understand our relationship with authority. We became bolder, more creative, less scared of confrontation. It was liberating, as if we were caged animals smashing through the bars. The few sets we played shaped me into who I am today, something I couldn’t fully understand at the time.
Decades later, I attended a funeral for our guitarist. It was the most painful experience of my life and I still carry the scars from seeing his body lying in an open casket to this day. After the viewing, my childhood friends and I all got together to reminisce. We spent the rest of the evening telling stories about all the stuff we managed to get away with in high school. Aguasaurus inevitably came up and the surviving bandmates and I told tall tales of our messy practices and even messier live shows. For a brief moment, I was no longer focused on the fact that my friend had been tragically taken from us too soon. I was grateful that we got to share the stage together so many times and use our music as weapons. His off-tempo guitar riffs still echo through my body. There’s electricity in my blood. I carry the spirit of punk rock with me every day, just as I feel that Nora still must even after trading in her guitar for a subdued adult life.
You can’t stamp out a rebellion once the sparks have been lit. It is a fire that will always burn within me, only glowing brighter to honor each fallen comrade. Punk rock never dies.
Lost Records: Bloom and Rage was tested on PS5 Pro.
5 games I used to think were 10/10 masterpieces but was wrong about
I’ve been playing video games since the age of two, with the yellow Beetle from Midtown Madness 2 being my first companion in the digital world. Now, 24 years later, I’ve racked up countless gaming experiences — some good, some bad, and some unforgettable. As a teen growing up during a time when gaming rapidly evolved, my benchmarks for a “perfect” game kept shifting. Sure, some of those games have aged like fine wine. But others? Not so much.
There was a time when a hack-and-slash like Daemon Vector would’ve cracked my top ten, but today it’s barely relevant. Just like that, there were times I went gaga over certain games, calling them masterpieces and handing them a mental 10/10, G.O.A.T. badge without hesitation. But with age and experience, I’ve come to accept that some of those so-called “perfect” games… weren’t really that perfect.
Related
I’m still mad about these 5 canceled games we never got
From Spider-Verse dreams to Boba Fett’s lost origin, here are 5 cancelled games that still haunt gamers.
5
Cyberpunk 2077
A brilliant foundation, but the house is missing rooms
Cyberpunk 2077 scratched a very specific itch for me — one I hadn’t felt since the golden days of Deus Ex. The prologue alone had me raving to my non-gamer friends. It was that cool. The gameplay is slick, the traversal is fun, and the premise is flat-out bonkers in the best way. But after finishing Elden Ring — arguably a flawless open-world experience — it became impossible to ignore the cracks in Cyberpunk’s design.
The side quests are insanely fleshed out, but the main story rings emotionally hollow and leaves very little impact. A great story is supposed to have an impact above all, and that’s what I believe Cyberpunk 2077’s central narrative feels like. Worse yet, the “life path” you choose, which defines V’s entire backstory, barely changes anything in the story outside a handful of dialogue options during quests.
Why couldn’t I have remained a Corpo, playing double agent from within Arasaka? Why did Johnny’s takeover boil down to a binary choice at the very end instead of a steady emotional decline? For someone who stole Arasaka’s most prized tech, the lack of serious consequences throughout the campaign was baffling. The excellent expansion, Phantom Liberty, proves that Cyberpunk 2077 can tell a gripping, focused story, which only makes the base campaign feel more hollow in comparison.
Cyberpunk 2077 is still an 8/10 for me, and I fully intend to start over the game in the near future. However, it’s just not the 10/10 banger I once believed it to be.
Cyberpunk 2077
Related
10 greatest open world games you can get lost in
Lose yourself in these 10 unforgettable open world games that make you forget the real world
4
Batman: Arkham Knight
The definitive Batman experience buried beneath a Batmobile obsession
I loved Batman: Arkham Knight as a teenager. The gritty visuals, the brutal combat, and the rain-drenched city — it was all so Gotham. The story was emotionally impactful, the ending beautiful, and it all came together to make Arkham Knight a solid 10/10 for me. In retrospect, however, I can’t shake off just how over-reliant the game is on the Batmobile, so much so that they left a bad taste in my mouth upon a revisit.
I spent a major chunk of the game maneuvering the Batmobile, and throughout those moments, I was a mech on wheels, not the world’s greatest detective or the terrifying shadow who stalked evil. When the Batmobile is practically shoehorned into puzzles, combat, boss fights, and stealth segments, it becomes less of a cool tool and more of an overbearing requirement.
Worse, the true ending is locked behind Riddler trophies that made online guides almost required reading. It’s like buying a box set and being told the finale is in a separate box you don’t have. Today, Arkham Knight is still a solid, highly recommended game for me, but definitely not the flawless superhero sim I used to champion. That mantle has been taken by 2018’s Marvel’s Spider-Man.
Batman: Arkham Knight
Related
7 PC gaming scandals you forgot about
Sometimes, it’s worth remembering the bad bits
3
Assassin’s Creed IV: Black Flag
Gorgeous but structurally dated
Assassin’s Creed IV: Black Flag was the first game ever that made me go “holy cow, this is next-gen.” I played it on my brand-new GTX 760 back in 2013, and it was breathtaking. Naval combat finally clicked for me, despite having paid no mind to it in AC III. In Edward, I once again had a handsome, roguish, and charming protagonist after Ezio, and he became my third-favorite protagonist in the entire Assassin’s Creed series, behind Altaïr and Ezio.
But on a recent revisit, I couldn’t ignore just how much the game leans on repetitive tailing and eavesdropping missions. The world hinted at the open-world RPGs Ubisoft would eventually lean into, but back when it felt expansive yet digestible. I still want that rumored remake — I’d play it day one — but in hindsight, the repetition and lack of real mission variety bring it down from masterpiece territory. My nostalgic glasses may be strong, but they don’t make me blind.
Assassin’s Creed IV: Black Flag
Related
Calm down — Assassin’s Creed Shadows is surprisingly good
Assassin’s Creed Shadows delivers stunning visuals and tight combat but stumbles under weak writing and pacing issues.
2
Forza Horizon 4
A love letter that forgets to include the reader
After having played Driveclub on my base PS4, and then mourning the shutdown of its studio, Forza Horizon 4 was the game that reignited my love of racing. My friend and I spent weeks on it, skipping weeks’ worth of lectures to get that H badge. It was everything I wanted—visually stunning, lightning-fast, and packed with content.
But recently, while introducing my partner to gaming, I noticed how punishing the game can be for newcomers, not to the Horizon series, but to racing in general. The narrow roads in Edinburgh? Brutal. Watching her bounce off walls more than asphalt was heartbreaking. I myself had taken a while to master the game, but the fun factor gets buried when your first impression is so discouraging. Worse still, the beautiful map feels small and likely sacrificed in favor of showcasing seasonal shifts. But not being able to manually change seasons? That was a buzzkill. We started in winter, and it was so cold and unforgiving that I had to literally change my PC’s system date just so she could experience spring evenings in Edinburgh.
I still love Forza Horizon 4, but it’s not quite the masterpiece I once made it out to be.
Forza Horizon 4 is now delisted from all online storefronts.
Related
Someone connected a racing simulator setup to their RC car using an Arduino, and I’m seriously jealous
Micro Machines in real life.
1
The Last of Us Part II
An emotionally complex narrative that stumbles in its delivery
At one point, I believed The Last of Us Part II was the boldest and most powerful narrative ever delivered in a video game. And in many ways, I still admire its raw ambition. It subverted expectations, shattered comfort zones, and forced me to confront the uncomfortable. But on replay — and with the benefit of hindsight — the cracks in its pacing and structure began to show. The early game’s jarring time jumps and tonal imbalance between the prologue and Act 1 feels unrefined, almost unsure of themselves. And then, just as the story regains momentum, it slams the brakes and resets halfway through.
Yes, the structure serves a purpose — to humanize, challenge bias, make you lose your sense of self, and question the act of revenge. But a day-by-day switching narrative could’ve preserved that emotional duality without draining the impact. The problem isn’t the story it tells — it’s how it tells it. The shifts in gameplay and tone can feel like a grind, with emotional peaks dulled by repetition and uneven pacing. And in a game so dependent on narrative to drive home its weight, that’s a real problem.
A lot of moments while playing The Last of Us Part II reminded me of the problems I had with seasons seven and eight of Game of Thrones, where everybody and their dog were practically teleporting all across the country, while the first game was all about taking almost a whole year to go across the country. Make no mistake, The Last of Us Part II is still one of the boldest AAA games ever made. But perfect? I used to think so. Now, I think it’s a beautifully flawed experience that aims for greatness and lands just short.
The Last of Us Part II
Related
I reopened an old wound by playing The Last of Us Part II Remastered on PC
I played The Last of Us Part II Remastered on PC, and it hit harder than ever. A technical triumph and emotional wrecking ball.
Growing up means looking back
It’s strange, really. We often think of the games we loved as timeless, untouchable classics — as if our memories of them somehow froze their perfection in place. But just as we grow, so do our expectations. And sometimes, with a bit of distance and a new perspective, we see the cracks in what once felt like masterpieces.
That’s not to say these games are bad — far from it. I still cherish each of them for what they gave me at the moment. The rush, the wonder, the hours lost to obsession. But a 10/10 game? That’s a rare thing. And the older I get, the more I realize it’s okay to admit that some of my former “perfect” games weren’t really perfect after all. They were just perfect for me at the time.
How to use Apple Software Restore to clone your Mac’s drive
Apple Software Restore lets you clone your Mac even with a Signed System Volume. Here’s how to use it to copy your Mac’s storage.
For a variety of reasons, you may want to make a clone of your Startup Disk on your Mac. This can include software testing, backups, configuration, or many other reasons.
In the past on macOS this was relatively easy, but that changed with macOS Big Sur because Apple added what is known as a Signed System Volume to each macOS Startup Disk. Signed System Volumes are encoded with a special cryptographic marker for that one installation.
If you try to clone a Signed System Volume or copy it, the copy will fail. Apple does this on purpose to prevent theft of Startup Disk volumes – and to prevent malicious software (malware) from hacking the macOS installed on Startup Disks.
Ever since Apple added Signed System Volumes, most third-party clone software also won’t work. Or at least they won’t work when trying to create a bootable clone of a macOS system volume.
There is, however, one way to still clone macOS drives since macOS Big Sur that does work: Apple Software Restore (ASR).
Using ASR, you can use a part of macOS to copy a Startup Disk volume, then set it as an authorized (signed) volume, which will boot successfully.
You can also use ASR to restore disk image (.dmg) files to physical disk volumes. In fact, when you do a Restore from within macOS’s Disk Utility, it uses ASR under the hood to perform the Restore.
How to clone your Startup Disk using ASR
This guide covers macOS Catalina or later. For earlier versions of macOS, the process is slightly different.
To make a clone on an Apple Silicon Mac, you must have a copy of macOS installed on the target. You’ll need it to make the clone bootable for your Mac, as this process doesn’t work if you try to clone onto an empty drive on a Mac.
For cloning on an Apple Silicon Mac, you must be using macOS Monterey or later. macOS Big Sur or earlier won’t work.
You also can’t cross-boot a cloned drive, i.e., you can’t boot a clone made on an Intel Mac on an Apple Silicon Mac or vice versa.
Grant full disk access to the Terminal app in System Settings.Also, be aware that any FileVault encryption your source drive uses will not be copied to the target. If you want to use FileVault on the target after cloning, you must boot into the cloned drive, re-enable FileVault, and allow it to re-encrypt the drive.
You’ll also need to be comfortable using macOS’s Terminal app and in using disk volumes and the macOS Finder. A system administrator password is required to perform the cloning.
The Terminal app also needs to be granted Full Disk Access in System Settings->Privacy & Security->Full Disk Access in order for the cloning process to work. If Terminal doesn’t appear in the list of apps to grant access to, click the + button and add it to the list from the /Applications/Utilities folder on your Startup Disk.
Choose source and destination volumes
The disk volume you want to clone is called the source volume, and the drive you want to clone it to is called the destination. The destination should be an Apple File System (APFS) Container, but it can also be a single volume.
The source and destination can be on the same drive, but it’s not recommended in case something goes wrong or in case errors occur during cloning.
Either or both the source and destination drives can be an internal drive inside your Mac or an external drive. You can also clone from a Disk Utility disk image if it was also previously made using ASR.
If you want to set up an unformatted external drive to use for the clone, first erase it using macOS’s Disk Utility app located on your Startup Disk at /Applications/Utilities.
Warning: Be aware that using Disk Utility makes it easy to erase drives and destroy data. You may want to unplug any additional external drives connected to your Mac first.
Always back up your data before erasing any drive.
Once you have Disk Utility running on your Mac, select View->Show All Devices in the menu bar, then click the disk drive you want to erase from the list on the left. Be sure to select a top-level physical drive from the list, and not a volume or container on a drive.
When you’ve confirmed this is the drive you want to erase, click the Erase button in Disk Utility’s main window. This will erase all volumes and software on the disk, including any other volumes present. You cannot undo this action, so be sure to choose the device to erase carefully.
Use Disk Utility to erase a new drive for use as an ASR target.In the Erase sheet, give the new volume a name, and set the Format: pop-up menu to APFS. If there’s a Scheme: pop-up menu present, set it to GUID Partition Map, and click the Erase button. This Erases the disk.
Once the Erase process completes, you’ll see a single new empty disk volume mount on the Finder’s Desktop. Quit Disk Utility.
View disk and volume info in Terminal
For this next step, you may want to first eject and unplug all storage devices from your Mac except for the ones containing the source and destination disks. Doing so makes this step easier.
Next, you’ll need to view the specifics of your source and destination drives in macOS’s Terminal app to gather some data needed for ASR. To do so, open the Terminal app on your Startup Disk at /Applications/Utilities.
Then, in Terminal type:
diskutil list
and press Return on your keyboard.This displays info about all storage devices connected to your Mac, including their BSD (UNIX) device entries. Each drive entry listed in the
/dev
directory includes:- Drive partition or container scheme
- A list of volumes on each device
- The type, name, ID, and size of each volume on each device
For example, the first device might have a device entry of
/dev/disk0
and one or more sequentially numbered volumes (partitions) on it, starting with a partition name such asdisk0s1
. Additional volumes will have similar names with increasing partition numbers.You’ll also note that the last component of each device entry is the BSD disk name, and it always matches the disk name of the partition scheme listed under the
IDENTIFIER
column. For example,/dev/disk0
always has a partition scheme with an ID ofdisk0
. The same is true for additional drives.This helps you remember which volumes belong to which devices.
Next, note down the device entries and volume (partition) names and identifiers of the source and destination volumes you want to use for the cloning operation.
This is really important to do. If you specify an incorrect volume identifier as the destination disk during cloning, all its data may be destroyed, and there’s no way to undo it.
Take your time and be careful.
Viewing device info on the Mac using the diskutil command in Terminal.You may also notice in the disk list several partitions with names such as
Apple_APFS_ISC
andApple_APFS_Recovery
. These are special hidden volumes used by macOS, and you shouldn’t touch them. Doing so may render your Mac unbootable.Device and volume confusion
Apple File System (APFS) can be a bit confusing sometimes.
This is due mainly to two concepts: container disks (usually of type
Apple_APFS
) and synthesized or virtual volumes. Container disks can contain other volumes.A container works as a sort of wrapper around one or more other volumes, all of which can be of different types.
Containers are useful because they enable the manipulation of multiple volumes at once, such as copying, cloning, and repairing. Containers also provide some additional internal information in case there’s a problem with one or more of the volumes they contain.
When you expand a container, it can then be treated as a device and the volumes it contains can be manipulated individually.
Also be aware that partitions of type
Apple_APFS
are different than partitions of typeAPFS Volume
andAPFS Snapshot
. This is because in APFS, containers can be expanded as if they were physical devices, and their wrapped volumes displayed as if they were volumes on a real, physical device.In macOS,
Apple_APFS
almost always represents a container, andAPFS Volume
almost always represents a single, individual volume.Once you understand this, it’s easy to see how a Container device entry in the
diskutil
list can be confused for a real, physical device. Again – be careful.Next to each device entry, you’ll notice a description in parentheses to indicate if the drive is a real, physical drive or a synthesized one. So, for example, you might see
(internal, physical)
or(synthesized)
next to a device entry.All of this can be very confusing and lead to potential errors when using the
diskutil
command and Terminal. This is because, in some cases, it’s possible to have a virtual device entry that is actually a container on a real, physical device.Such virtual devices will usually somewhere in their volume list contain the empty label
Physical Store
followed by the partition identifier of the partition on the real, physical device they point back to.For example, you may see a container scheme line in a virtual device entry’s list, followed by a blank line which contains only the label “Physical Store”, such as:
Physical Store disk0s2
Usually, right after that line will be listed the APFS volumes themselves, for example:
APFS Volume Untitled 460.0 KB disk3s1
This indicates that the container scheme itself points back to an
Apple_APFS
Container on a physical disk. And usually in these cases, aAPFS Container Scheme
‘s size will be identical to theApple_APFS
Container it points back to.Tiny APFS Volume entries listed in the KB size range usually indicate the disk was newly erased with a single empty volume on it. To clone into a container, you can either remove all volumes inside it or merely add your clone as a new volume into it.
Contrary to what you might think, it’s entirely possible to add a clone into the container that contains the volume macOS is currently booted into. We’ll get to this below.
Also, before you start the clone, make sure the destination has enough space to hold the full size of the entire clone. If it doesn’t, the clone will fail.
This includes any recovery and boot partitions marked with “Preboot” or “Recovery” if you’re cloning an entire device. You should probably allow for a little extra space in case ASR needs to move things around. A few GB should be enough.
To summarize the above example:
disk0
– a real, physical device entry with aGUID_partition_scheme
on itdisk0s2
– anApple_APFS
container on physicaldisk0
disk3s1
– anAPFS Volume
on a synthesized device (disk3
) with aAPFS Container Scheme
on itPhysical Store disk0s2
– The identifier of theApple_APFS
on the physical device from whichdisk3
was synthesized
Probably the biggest gotcha in trying to understand all this is that the
IDENTIFIER
of the parentApple_APFS
container appears in the text of the “Physical Store” label in theNAME
column on the synthesized child device entry (just before its volume list).Once you grasp that relationship, understanding APFS becomes much easier.
Don’t worry if all this is confusing. APFS takes quite some time to get used to and understand. You’ll get it eventually.
The upshot of all this is that when running ASR to clone a volume, you have to be careful about which volume you target as your destination. If you make a mistake, it’s very easy to wipe out a container, which also wipes out all the volumes it references.
You can target a Container as the destination, but you have to be careful about how you do it.
It’s easy to determine the source and destination volumes in the
diskutil
list by looking for the Container or volume names you want in theNAME
column (such as “Macintosh HD”, for example). But be aware it’s possible in macOS to have two volumes with identical names, but with a differentIDENTIFIER
for each.Prepare for cloning
Once you’ve done all of the above and verified everything, it’s time to start the clone operation. For this example, we’ll assume you’re running macOS Monterey or later.
If the destination is an APFS Container and it contains the volume macOS is currently booted into, you must restart your Mac into Recovery Mode.
The steps for doing this are different if you’re using an Intel or Apple Silicon Mac. Apple also has a Intro to macOS Recovery page.
This is necessary to avoid restrictions imposed by System Integrity Protection. If the destination doesn’t contain the currently booted macOS volume, you can run ASR from Terminal without restarting.
Oddly, next you must make sure either FileVault or Find My Mac is enabled. This ensures Recovery Assistant will appear after a restart and ask you for an admin password.
Without this, ASR will fail.
Restart using the instructions from Apple above to boot into Recovery Mode. Once in Recovery Mode, select Utilities->Terminal from the menu bar.
Once in Terminal, run
diskutil list
as you did above. Note that the IDs for containers and volumes may have changed.If the source has FileVault enabled, you’ll need to unlock its data volume it with two commands in Terminal:
diskutil apfs listvolumegroups
diskutil apfs unlock
If you’re running ASR without running in Recovery Mode, you’ll need to instead unlock using the
diskutil apfs unlock
command followed by the data volume. For example:diskutil apfs unlock disk2s2
The data volume is a separate volume that resides next to the actual bootable macOS volume. So, for example, if your bootable Mac volume is named “Macintosh HD”, you’ll also see a second volume next to it named “Macintosh HD – Data”.
Prepare snapshots for cloning
Signed System Volumes contain a sealed snapshot of the copy of macOS that is on the Startup Disk. These snapshots are used to preserve the security of the installed OS to make sure it hasn’t been tampered with.
In order to use these snapshots on the destination, they must be copied over as-is. In order for ASR to make the snapshot copy, it has to know what the snapshot’s name or unique ID (UUID) is.
To get the snapshot UUID or name in Terminal, note the
diskutil
ID of the source’s system volume (for example ‘disk2s1’) in theIDENTIFIER
column with:diskutil mount disk2s1
This forces the volume to be mounted by macOS. Note this is the volume with macOS on it – not the Data volume.
Terminal will display the mounted volume name and echo back the ID when it does.
Next run:
diskutil apfs listsnapshots disk2s1
This displays the sealed snapshot’s name and UUID on this volume. If you get an error, go back and make sure the volume or Container ID you specified matches the one containing the macOS installation.
You should see something like:
i7@i7s-Mac-mini ~ % diskutil apfs listsnapshots disk2s1
Snapshot for disk2s1 (1 found)
|
+— E3D1AF2D-7182-3217-BC82-2874219DAB48
Name: com.apple.os.update-52F3A2F592F324F6AC5DE35D538FA237771DB7715C76582E51C5C432D80587DD
XID: 42
Purgeable: No
The short string next to the “+— ” is the snapshot UUID, and the longer string below it is the name. You can use either, but the UUID is easier.
You can also view the snapshot name/UUID for the source in Disk Utility from the menu bar by selecting View->Show APFS Snapshots.
Note, you must have an actual macOS volume selected in the sidebar in Disk Utility for this menu item to be enabled. Selecting the physical device or the Container won’t work.
Viewing snapshot UUID and name in Disk Utility.Start the cloning operation
The command for starting the ASR cloning process is easy, but the entire command line is quite complex.
The main command is:
asr restore
There are several options and parameters that go along with it. The three most important possible options are:
- — source
- — target
- — erase
You can also use the
--file
option to target a file as the destination. There are other options for skipping verification and warnings and controlling output.There’s also a cool
server
option to multicast a clone over a network, but it requires the--erase
flag. ASR can also read multicast .dmg files over a network by using the asr:// protocol. But in general, asr:// isn’t used much.For a complete list of options and usage, in Terminal type:
man asr
and press Return on your keyboard. There’s also an online version at ss64.com.The man page has sections that discuss restoring from filesystems, snapshots, and volumes. To exit the man system in Terminal, type Control-Z or q on your keyboard.
You can get verbose output while cloning with the
--verbose
and--debug
flags.An example of the simplest clone command line might look like this:
sudo asr restore --source /Volumes/source --target /Volumes/dest
To do the same as above but also erase and destroy all data (including volumes) on the destination when cloning, also add the
--erase
flag at the end of the command line before starting.The
--erase
flag destroys all existing data on the target, so use it carefully. It’s easy to wipe out several volumes at once inadvertently if you’re not careful.To include the above snapshot if you’re running in Recovery Mode, also add the
--toSnapshot
flag followed by a space, then the snapshot name or UUID you obtained above. This will make the destination clone look and behave exactly like your source volume.In most cases, if you target a container and omit the
--erase
flag – and if your source is a single volume, the volume will be added to the container and the other volumes will be left alone.But again, use caution and always back up all your volumes and data first, just in case something goes wrong.
When running in Recovery Mode, you can usually omit the
sudo
at the start of the command because you entered an admin password when Recovery Mode started.When ASR starts, it will prompt to ask if you’re sure unless you used the
--noprompt
flag above. Press y in response and press Return.ASR will run several steps to execute the clone, and if everything worked, at the end you’ll see the message “Restore completed successfully.”. If a clone fails, you’ll need to open Disk Utility and look for a volume with “ASR” in its name and then Erase it from the toolbar.
Again, proceed with caution. Don’t accidentally erase the wrong volume.
Make the clone bootable
When a clone operation succeeds, the destination still isn’t bootable. You’ll need to do a few additional steps to make it so.
After ASR runs, the destination volumes all have the same names as the originals (or one volume if you didn’t clone a Container). You’ll need to rename these volumes with unique names so they don’t conflict with the originals.
If more than one volume with an identical name is mounted on the Finder’s Desktop, macOS will change one of the volumes’ names silently but only in the background. The “real” name the filesystem sees for each volume will be different than the duplicate(s)’ names shown in the Finder, which can be confusing.
I’s best to make sure all volumes have unique names.
You can rename unlocked volume names in the Finder by clicking on their names and typing new ones. Alternately, you can rename them in Disk Utility by selecting them in the sidebar, then Control-clicking each one and selecting Rename from the popup menu.
At any rate, it’s best to restart your Mac after renaming volumes to make sure the system picks up all the new names and discards any ones it may have created in the background.
Note that this renaming also has to be done for the destination’s Data volume. For example:
- Macintosh HD
- Macintosh HD – Data
might become:
- NewExternal HD
- NewExternal HD – Data
Do not rename the special volumes on the clone named:
- Preboot
- Recovery
- VM
- Update
If you do, the clone may not boot.
If you’re still in Recovery Mode, you’ll need to restart back into your normal installation of macOS to complete the next steps.
Once you’re back in macOS, open System Settings, go to General->Startup Disk and set your clone as the boot volume. This causes macOS to bless the volume for booting by setting some special flags on it.
You can now restart into the cloned volume by clicking the Restart button.
If you see the message “This volume does not have any authorized users for this computer”, click Authorize Users and follow the instructions. You may need to enter an admin password several times.
You may also want to run First Aid in Disk Utility on the clone or its Container first before rebooting, just to make sure everything is ok on the destination.
If, for any reason after restarting, you can’t boot from the clone and can’t get back to your original Startup Disk, you can select which volume to start from by resetting your Mac and then holding down a key:
- Power button (Apple Silicon)
- Option key (Intel Macs)
This preempts the boot process and displays a screen that gives you the option to select which volume to boot from.
Now you know how to make clones of your Startup Disk in various ways. Be careful when making clones since it’s very easy to destroy data.
Apple Software Restore isn’t intended for mass deployment of macOS to multiple machines. It is possible to do so, but it’s not a good idea.
Instead, you should use Apple’s MDM technology to deploy to multiple devices at once. See the macOS Deployment Guide for more info.
ASR can be dangerous if not used carefully. For this reason, you should only use it when you’re sure you have enough time to do a restore without rushing.
One single mistake can wipe out multiple drives at once and destroy all the data on them in an instant.
It might also be a good idea to set up a test Mac with some extra drives on it and practice before using ASR in a real-world environment. You can use inexpensive USB thumb drives as test drives, although they will be a bit slower.
Also see Apple’s technote (102655) How to reinstall macOS.
OPPO Find X8 Ultra review: Better than the best
Why you can trust Android Central
Our expert reviewers spend hours testing and comparing products and services so you can choose the best for you. Find out more about how we test.OPPO is crushing it in 2025; the debut of the Find X8 and X8 Pro allowed the brand to build decent momentum going into the year, and the Find N5 showcased just what’s possible with foldables. OPPO is building on that with the introduction of the Find X8 Ultra, its best phone yet. Last year’s Find X7 Ultra was one of my favorite phones, and it was only bested by Vivo’s X100 Ultra when it came to photos and videos, so I was keen on taking a look at what OPPO is doing this year.
The Find X8 Ultra has a new design that’s in line with the standard X8 and X8 Pro, and while the overall aesthetic doesn’t quite stand out quite as much as previous years, it’s great to hold and use. Thankfully, the phone retains the quartet of 50MP cameras at the back, and you get a 1-inch main sensor that takes outstanding photos and videos.
There are the usual upgrades in other areas, and I like that the phone has a 6100mAh battery; it lasts longer than just about every other device I tested in 2025, and is on par with the Vivo X200 Pro in this regard. While there’s obviously a lot to like, the Find X8 Ultra has the same foibles as its predecessor; the phone is limited to China as of writing, and there are no plans to bring it to global markets.
OPPO Find X8 Ultra: Pricing and availability
(Image credit: Apoorva Bhardwaj / Android Central) OPPO unveiled the Find X8 Ultra at a launch event in Xi’An, China, on April 10. I was invited to attend the event, but I wasn’t able to go due to a visa rejection (which is incredibly annoying). Anyway, the device is now available in China, where it is sold in three storage configurations: the base 12GB/256GB model costs ¥6,499 CNY ($891), the 16GB/512GB edition is ¥6,999 CNY ($959), and the 16GB/1TB model is ¥7,999 CNY ($1,096).
The 1TB model is the only one that gets satellite messaging, and as I’m using the 16GB/512GB edition of the device, I wasn’t able to test the feature. The Find X8 Ultra was joined by the Find X8s+ and Find X8s, with both devices offering incremental updates to the Find X8 and X8 Pro.
Annoyingly, the Find X8 Ultra won’t be available outside China, and in a statement to Android Central, OPPO said: “The Find X8 Ultra is planned for release only in mainland China. However, many of the technologies featured in this device will be incorporated into future OPPO products, which will be available in more regions.”
OPPO Find X8 Ultra: Design
(Image credit: Apoorva Bhardwaj / Android Central) OPPO always delivered standout designs with Find X models, but it is taking a conservative approach this time around. The Find X8 Ultra has a similar aesthetic as the X8 and X8 Pro, and it misses out on some of the design flair of previous generations. The Find X7 Ultra was one of the best-looking phones of 2024 thanks to a gorgeous dual-tone leather and glass design, and the Find X6 Pro also had a distinctive design.
(Image credit: Apoorva Bhardwaj / Android Central) While the X8 Ultra misses out on some of that flamboyance, it has the same great build quality. Most phones now use flat sides — ostensibly to deliver bigger batteries and increased longevity — and the X8 Ultra is no different. Thankfully, the sides are beveled, and that makes holding and using the device that much more comfortable. Coming in at 226g, it has a good heft and doesn’t feel unwieldy in the least, and OPPO did a good job with the weight distribution.
(Image credit: Apoorva Bhardwaj / Android Central) Notably, it is thinner than the Xiaomi 15 Ultra, but you don’t notice it that much because of the sheer size of the camera island at the back. Like previous years, the oversized camera dominates attention at the back, and the quartet of lenses are arranged symmetrically. I got the white model, and it has a matte texture that’s good to hold — all while minimizing smudges.
(Image credit: Apoorva Bhardwaj / Android Central) The phone is clearly built to last; I didn’t use it with a case, and after two weeks of testing and several tumbles, there’s no visible damage or scratches whatsoever. You also get IP68 and IP69 ingress protection, and I didn’t see any issues using the device in a sauna.
(Image credit: Apoorva Bhardwaj / Android Central) OPPO also switched to an ultrasonic module this time, and it is fantastic; it is fast to authenticate and doesn’t have any issues even if you use the sensor with wet fingers. The location is ideal — unlike previous years — so I was able to use my thumb to unlock the device without any hassle.
A notable addition is a dedicated button on the right that serves as a shutter button. Pressing it twice launches the camera, and you get to shoot with a single press, with a slide along the button to adjust the zoom level. The button sits flush with the mid-frame, and while it is a decent enough addition, I didn’t use it quite as much — just like Camera Control on the iPhone 16 Pro Max.
(Image credit: Apoorva Bhardwaj / Android Central) Another new inclusion is the Shortcut Button, with the alert slider making its way to a multifunction button. The feature is identical to the Action Button on an iPhone, and it allows you to toggle DND, launch the flashlight, take notes, memos, and so on. The menu to configure the button is also identical to iOS, and some originality in this area would have been better.
OPPO Find X8 Ultra: Display
(Image credit: Apoorva Bhardwaj / Android Central) I’m not going to talk about the panel too much, as there isn’t much that’s new. The Find X8 Ultra uses a similar-sized 6.82-inch AMOLED as previous years, and it has a QHD+ resolution of 3168 x 1440 and 120Hz dynamic refresh that goes down to 1Hz. The main difference is that the panel is fully flat, and it has uniform bezels of 1.4mm on all sides.
(Image credit: Apoorva Bhardwaj / Android Central) The panel has standout colors and contrast levels, and I had no problems in this regard. It gets bright in outdoor use, and only the Pixel 9 Pro XL outmatched the device in overall brightness. Stereo sound is loud and detailed, and gaming is enjoyable on the device. With 2160Hz PWM dimming as standard, it’s easy on the eyes too.
ColorOS has decent customizability when it comes to always-on styles, and you get a decent set of choices in tailoring the device to your tastes. While the overall brightness is lower at 2500 nits, the phone gets brighter in real-world use, and that’s what you actually need.
OPPO Find X8 Ultra: Hardware
(Image credit: Apoorva Bhardwaj / Android Central) While the regular Find X8 Pro used the Dimensity 9400, the Find X8 Ultra goes back to Qualcomm silicon. There is no difference in daily use between the two, but the X8 Ultra tends to get hotter. This isn’t just limited to the X8 Ultra — all phones I used powered by Qualcomm silicon this year had issues with overheating.
That said, the Find X8 Ultra is one of the fastest phones you can buy today. I didn’t see any slowdowns whatsoever, and even demanding games ran without breaking a sweat. Having used over a dozen devices powered by this silicon, it’s clear to me that there’s more than adequate headroom; now we just need console-quality games to test the caliber of the hardware.
(Image credit: Apoorva Bhardwaj / Android Central) As I’m using the Chinese edition of the phone, I ran into issues with connectivity in general. Calls tended to be glitchy (those on the other end couldn’t hear me), and OPPO has hard-coded DNS as standard, so if you use a custom DNS, you’ll need to go into the settings and use a static IP and manually change your DNS server.
Other than that, there are no issues. The vibration motor is among the best on Android, delivering granular feedback when navigating the interface and using the keyboard. While it doesn’t have Bluetooth 6.0 like the Xiaomi 15 Ultra, that’s about the only limitation I can think of, and it has one of the best hardware packages of any device in 2025.
OPPO Find X8 Ultra: Battery life
(Image credit: Apoorva Bhardwaj / Android Central) One of the biggest changes this year is the introduction of silicon-carbide batteries, and the X8 Ultra uses the tech to good effect. The phone has a much bigger 6100mAh battery, and it lasts a day and a half comfortably. In two weeks of heavy use, I didn’t have to charge the phone before the end of the night, and more often than not, I just had to charge the phone once a day and a half.
There is no reason to worry about the battery, and aggressive memory management with Chinese ColorOS 15 makes the device last a little longer. Charging it takes just over 44 minutes thanks to 100W tech, and as an added bonus, it goes up to 50W over USB PD, so you don’t need to use the bundled charger all the time.
OPPO Find X8 Ultra: Cameras
(Image credit: Apoorva Bhardwaj / Android Central) OPPO knows how to deliver a strong camera package, and the Find X8 Ultra is one of the best phones I’ve used this year. It has a 1-inch 50MP Sony LYT-900 sensor (the same as last year), 50MP Samsung JN5 wide-angle, 50MP Sony LYT-700 tele lens with 3x zoom, and a secondary tele 50MP that uses the Sony LYT-600 imaging module going up to 6x. There’s a 32MP camera at the front with autofocus.
The caliber of the imaging modules alone makes the Find X8 Ultra a real powerhouse, and the brand is leveraging Hasselblad’s tuning to eke out magnificent shots. The interface itself is unchanged, and you can easily access the shooting modes and lenses via the viewfinder or the dedicated button on the right.
The device excels at taking videos, with all four cameras at the back able to shoot Dolby Vision footage at 4K60. That is a big deal in and of itself, but what’s particularly great this year is that the device shoots Dolby Vision footage even when the ultra-steady stabilization mode is enabled.
Daylight photos have faultless detail and color vibrancy, and there isn’t anything to criticize in this area. It’s great that the X8 Ultra retains the 1-inch sensor; it allows the device to take better photos than just about any other phone today. I didn’t see any problems in low-light conditions, with the phone consistently delivering vibrant shots with no visible noise.
But it’s the auxiliary lenses that are truly noteworthy; you get four great cameras on the back of this phone, and the inclusion of two tele lenses makes things that much more interesting. The ability to get detailed shots at 6x and beyond is wonderful, and I got passable shots at up to 20x.
Basically, the Find X8 Ultra has one of the best camera packages I used until now. It does a better job than the Find X8 Pro, Xiaomi 15 Ultra, Galaxy S25 Ultra, and Pixel 9 Pro XL, and holds its own against the Vivo X100 Ultra and X200 Pro. The only issue with the camera is that the device isn’t launching globally, limiting its potential. While the brand says it will use these technologies in other products, it would have been great to see the Find X8 Ultra outside China.
OPPO Find X8 Ultra: Software
(Image credit: Apoorva Bhardwaj / Android Central) The Find X8 Ultra is available only in China, so it’s using the Chinese version of the ColorOS skin based on Android 15. It is visually similar to the global model, but includes a ton of extras, including a local digital assistant dubbed Breeno. It is just as fluid in regular use, and the interface looks modern and has a cohesive design. That said, it ends up looking like iOS thanks to the changes introduced this year.
My biggest issue with the software is the sheer amount of bloatware that’s pre-installed; it’s definitely more than what’s bundled with the global versions. Thankfully, most of the utilities can be uninstalled. There are the usual issues with push notifications and aggressive memory management, and it makes using the Find X8 Ultra a little annoying.
(Image credit: Apoorva Bhardwaj / Android Central) Continuing with the list of annoyances, ColorOS 15 has the worst DND of any Android phone; it clubs calls and messages into a single category, so there’s no way to mute message notifications and not get calls. This is clearly set up by someone who doesn’t make or receive any calls, because in regular use, it just doesn’t make any sense.
Usually, I’ll have to do at least some tweaking to get Google Mobile Services installed on a phone running a Chinese build, but that wasn’t the case on this device. The Play Store APK is included, and it can be easily installed, and then you can log in to your Google account and install everything else.
Coming to updates, the Find X8 Ultra will get five years of Android updates along with six years of security updates, and that is in line with most Chinese devices. Honor is delivering seven years of Android updates to the Magic 7 Pro, but that device continues to be an outlier — at least in the context of Chinese manufacturers.
OPPO Find X8 Ultra: The alternatives
(Image credit: Apoorva Bhardwaj / Android Central) I really like the Xiaomi 15 Ultra, and the device has a standout camera package along with a great design and all the other extras. The best part is that the phone is available outside China — it is now on sale in India and the U.K. I prefer the color balance of the Find X8 Ultra over the Xiaomi 15 Ultra, but there’s no arguing that Xiaomi has the better software package as it comes with the Play Store and all associated Google services out of the box.
I’m interested in seeing what Vivo does with the X200 Ultra, because that may just be the only device that can do better than the Find X8 Ultra; the device is slated to launch in May, so we don’t have to wait too long to see what it delivers.
OPPO Find X8 Ultra: Should you buy it?
(Image credit: Apoorva Bhardwaj / Android Central) You should buy this if:
- You need the best camera package
- You want a phone that takes stunning portrait shots
- You need versatile cameras that shoot great videos
- You want a battery that lasts a day and a half
- You need all the extras
You shouldn’t buy this if:
- You need a phone with the Play Store pre-installed
- You need the same number of software updates as your Pixel
The only negative with the Find X8 Ultra has to do with the software; the Chinese version of ColorOS has too many inconsistencies to be usable outside the country — particularly if you want to use Google services. That’s why it’s annoying that the device won’t be debuting in global markets; OPPO has to do better in this area, and launch its best products to a wider audience.
Other than that, there isn’t anything to fault with the device. It has a great AMOLED panel, the best hardware currently available, standout battery life with the best charging tech in the industry, and the best cameras. The main 1-inch camera continues to be a delight to use in 2025, and the auxiliary lenses are among the best of any phone I used this year.
The Find X8 Ultra does a fantastic job with videos as well, and I thoroughly enjoyed using the phone. That said, I still wouldn’t recommend it unless you’ve used a device with a Chinese interface in the past. If you don’t mind the hassle of buying it via a reseller and missing out on after-sales service, then I’d suggest getting the phone solely because of the cameras.
The 47 best movies in April 2025
If you’re looking for the best movies on Netflix to stream right now, you’ve come to the right place. There are several thousand new titles on Netflix every single year, which can make deciding what to watch on any given night quite a challenge.
We are here to help with a massive list of all the best movies on Netflix. We will continue to update this post throughout the year as new movies start streaming on Netflix. We’ll also take movies off of the list as Netflix removes them.
One of Them Days (2025)
- Director: Lawrence Lamont
- Cast: Keke Palmer, SZA, Vanessa Bell Calloway
- Running time: 1h 37m
- Rating: R
“Scrambling to repay their stolen rent money, best friends Dreux and Alyssa embark on a frantic race across LA to find enough cash to avoid eviction.”
Heat (1995)
- Director: Michael Mann
- Cast: Al Pacino, Robert De Niro, Val Kilmer
- Running time: 2h 50m
- Rating: R
“A heist gone wrong leads to a high-stakes game of cat and mouse between a criminal mastermind and the hard-boiled detective obsessed with catching him.”
The Place Beyond the Pines (2012)
- Director: Derek Cianfrance
- Cast: Ryan Gosling, Bradley Cooper, Eva Mendes
- Running time: 2h 20m
- Rating: R
“A violent confrontation between a motorcycle-riding bank robber and a rookie cop spirals into a tense generational feud.”
Revelations (2025)
- Director: Yeon Sang-ho
- Cast: Ryu Jun-yeol, Shin Hyun-been, Shin Min-jae
- Running time: 2h 2m
- Rating: R
“A pastor who believes in divine revelation and a detective haunted by visions pursue a missing person case — exposing their own demons in the process.”
Smokey and the Bandit (1977)
- Director: Hal Needham
- Cast: Burt Reynolds, Sally Field, Jackie Gleason
- Running time: 1h 36m
- Rating: PG
“A race car driver tries to transport an illegal beer shipment from Texas to Atlanta in under 28 hours, picking up a reluctant bride-to-be on the way.”
Den of Thieves 2: Pantera (2025)
- Director: Christian Gudegast
- Cast: Gerard Butler, O’Shea Jackson Jr., Evin Ahmad
- Running time: 2h 10m
- Rating: R
“Rogue detective Nick O’Brien returns to hunt down a world-class thief, as the infamous Panther mafia plans its most ambitious diamond heist yet.”
Blade Runner: The Final Cut (1982)
- Director: Ridley Scott
- Cast: Harrison Ford, Rutger Hauer, Sean Young
- Running time: 1h 57m
- Rating: R
“In this restored cut of the sci-fi classic, ex-police officer Rick Deckard returns to the force to hunt down a group of rogue androids in dystopian LA.”
Sicario (2015)
- Director: Denis Villeneuve
- Cast: Emily Blunt, Benicio Del Toro, Josh Brolin
- Running time: 2h 1m
- Rating: R
“An FBI agent takes part in an undercover operation targeting a Mexican drug lord, but her ethics are challenged when the sting crosses the line.”
Sonic the Hedgehog 2 (2022)
- Director: Jeff Fowler
- Cast: James Marsden, Ben Schwartz, Jim Carrey
- Running time: 2h 5m
- Rating: PG
“Eager to be a hero, Sonic teams up with new friend Tails to stop Dr. Robotnik and Knuckles the Echidna from getting hold of an all-powerful emerald.”
Parasite (2019)
- Director: Bong Joon-ho
- Cast: Song Kang-ho, Lee Sun-kyun, Cho Yeo-jeong
- Running time: 2h 12m
- Rating: R
“One by one, the crafty members of a destitute family insinuate themselves into the household staff of a wealthy couple living in oblivious privilege.”
Saturday Night (2024)
- Director: Jason Reitman
- Cast: Gabriel LaBelle, Rachel Sennott, Cory Michael Smith
- Running time: 1h 49m
- Rating: R
“In 1975, a young producer races to prove his prowess as his chaotic cast of comedians prepares for their first-ever broadcast — live from New York.”
The Unbearable Weight of Massive Talent (2022)
- Director: Tom Gormican
- Cast: Nicolas Cage, Pedro Pascal, Tiffany Haddish
- Running time: 1h 47m
- Rating: PG
“After agreeing to attend a wealthy superfan’s birthday party, a struggling movie star finds himself embroiled in an international kidnapping plot.”
Hereditary (2018)
- Director: Ari Aster
- Cast: Toni Collette, Alex Wolff, Milly Shapiro
- Running time: 2h 7m
- Rating: R
“After the death of her mother, artist Annie and her family uncover their terrifying legacy and grapple with malevolent forces beyond their control.”
Lion (2016)
- Director: Garth Davis
- Cast: Dev Patel, Rooney Mara, David Wenham
- Running time: 1h 58m
- Rating: PG-13
“Years after being separated from his mom and adopted by an Australian couple, an Indian man returns to his hometown determined to find his birth family.”
Wallace & Gromit: Vengeance Most Fowl (2024)
- Directors: Nick Park and Merlin Crossingham
- Cast: Ben Whitehead, Peter Kay, Lauren Patel
- Running time: 1h 22m
- Rating: PG
“Top dog Gromit springs into action to save his master when Wallace’s high-tech invention goes rogue and he’s framed for a series of suspicious crimes.”
Apollo 13 (1995)
- Director: Ron Howard
- Cast: Tom Hanks, Kevin Bacon, Bill Paxton
- Running time: 2h 19m
- Rating: PG
“Technical troubles scuttle the Apollo 13 mission in 1970, risking the lives of astronaut Jim Lovell and his crew in this chronicle of a true story.”
Carry-On (2024)
Taron Edgerton as TSA agent Ethan Kopek in “Carry-On.” Image source: Netflix - Director: Jaume Collet-Serra
- Cast: Taron Egerton, Sofia Carson, Jason Bateman
- Running time: 1h 59m
- Rating: PG-13
“An airport security officer races to outsmart a mysterious traveler forcing him to let a dangerous item slip onto a Christmas Eve flight.”
Maria (2024)
Angelina Jolie as Maria Callas in “Maria.” Image source: Netflix - Director: Pablo Larraín
- Cast: Angelina Jolie, Pierfrancesco Favino, Alba Rohrwacher
- Running time: 2h 3m
- Rating: R
“Academy Award winner Angelina Jolie stars as legendary opera singer Maria Callas in director Pablo Larraín’s reimagining of the diva’s final days.”
The Piano Lesson (2024)
Samuel L. Jackson as Doaker Charles in The Piano Lesson. Image source: Netflix - Director: Malcolm Washington
- Cast: John David Washington, Samuel L. Jackson, Danielle Deadwyler
- Running time: 2h 7m
- Rating: PG-13
“A brewing battle over the fate of an heirloom piano threatens to tear a family apart in this drama based on August Wilson’s Pulitzer Prize-winning play.”
Hot Frosty (2024)
Lacey Chabert as Kathy Barrett in Hot Frosty. Image source: Netflix - Director: Jerry Ciccoritti
- Cast: Lacey Chabert, Dustin Milligan, Craig Robinson
- Running time: 1h 32m
- Rating: PG
“When a young widow’s magic scarf brings a dashing snowman to life, can he help her rediscover romance, laughter and holiday cheer before he melts away?”
Emilia Pérez (2024)
Selena Gomez as Jessi in Emilia Pérez. Image source: Shanna Besson/PAGE 114 – WHY NOT PRODUCTIONS – PATHÉ FILMS – FRANCE 2 CINÉMA - Director: Jacques Audiard
- Cast: Zoe Saldaña, Karla Sofía Gascón, Selena Gomez
- Running time: 2h 12m
- Rating: R
“Four remarkable women pursue happiness in Jacques Audiard’s audacious, genre-defying film that unfolds through a fever dream of original songs and dance.”
The Lost City (2022)
Brad Pitt, Sandra Bullock, and Channing Tatum in The Lost City. Image source: Paramount Pictures - Directors: Adam Nee, Aaron Nee
- Cast: Sandra Bullock, Channing Tatum, Daniel Radcliffe
- Running time: 1h 52m
- Rating: PG-13
“A romance novelist lands on a jungle adventure with her cover model after she’s abducted by an eccentric billionaire in search of a lost treasure.”
Woman of the Hour (2024)
Tony Hale as Ed and Anna Kendrick as Sheryl in Woman of the Hour. Image source: Leah Gallo/Netflix - Director: Anna Kendrick
- Cast: Anna Kendrick, Daniel Zovatto, Tony Hale
- Running time: 1h 35m
- Rating: R
“An aspiring actress crosses paths with a prolific serial killer in ’70s LA when they’re cast on an episode of “The Dating Game.” Based on a true story.”
A Quiet Place Part II (2020)
Emily Blunt in A Quiet Place Part II. Image source: Paramount Pictures - Director: John Krasinski
- Cast: Emily Blunt, Cillian Murphy, Millie Simmonds
- Running time: 1h 38m
- Rating: PG-13
“Forced to leave their home, the Abbotts must venture out into a world of deadly creatures drawn to sound — and other threats they never expected.”
Bad Boys: Ride or Die (2024)
Martin Lawrence and Will Smith in Bad Boys: Ride or Die. Image source: Sony Pictures Releasing - Directors: Adil El Arbi, Bilall Fallah
- Cast: Will Smith, Martin Lawrence, Vanessa Hudgens
- Running time: 1h 56m
- Rating: R
“When a mysterious enemy frames their late captain for corruption, Miami cops Mike and Marcus go rogue to expose a conspiracy — and clear their own names.”
Will & Harper (2024)
Will Ferrell and Harper Steele in Will & Harper. Image source: Netflix - Director: Josh Greenbaum
- Cast: Will Ferrell, Harper Steele
- Running time: 1h 54m
- Rating: R
“When Will Ferrell’s good friend Harper comes out as a trans woman, they take a road trip to bond and reintroduce Harper to the country as her true self.”
Rez Ball (2024)
Kauchani Bratt as Jimmy in Rez Ball. Image source: Lewis Jacobs/Netflix - Director: Sydney Freeland
- Cast: Jessica Matten, Kauchani Bratt, Kusem Goodwind
- Running time: 1h 53m
- Rating: PG-13
“After losing their star player, a high school basketball team rooted in Native American culture must unite to keep their state championship dreams alive.”
His Three Daughters (2024)
Elizabeth Olsen as Christina, Carrie Coon as Katie and Natasha Lyonne as Rachel in His Three Daughters. Image source: Sam Levy/Netflix - Director: Azazel Jacobs
- Cast: Natasha Lyonne, Elizabeth Olsen, Carrie Coon
- Running time: 1h 44m
- Rating: R
“Emotions run high when three estranged sisters reunite in a cramped New York City apartment to watch over their ailing father during his final days.”
Rebel Ridge (2024)
Aaron Pierre as Terry Richmond in Rebel Ridge. Image source: Netflix - Director: Jeremy Saulnier
- Cast: Aaron Pierre, Don Johnson, AnnaSophia Robb
- Running time: 2h 11m
- Rating: TV-MA
“A former Marine confronts corruption in a small town when local law enforcement unjustly seizes the bag of cash he needs to post his cousin’s bail.”
Godzilla Minus One (2023)
Godzilla Minus One is streaming on Netflix. Image source: Toho - Director: Takashi Yamazaki
- Cast: Ryunosuke Kamiki, Minami Hamabe, Yuki Yamada
- Running time: 2h 5m
- Rating: PG-13
“In postwar Japan, a traumatized former fighter pilot joins the civilian effort to fight off a massive nuclear-enhanced monster attacking their shores.”
Hit Man (2024)
Glen Powell as Gary Johnson in Hit Man. Image source: Brian Roedel/Netflix - Director: Richard Linklater
- Cast: Glen Powell, Adria Arjona, Austin Amelio
- Running time: 1h 55m
- Rating: R
“A mild-mannered professor moonlighting as a fake hit man in police stings ignites a chain reaction of trouble when he falls for a potential client.”
Suzume (2022)
Suzume is streaming on Netflix. Image source: Toho - Director: Makoto Shinkai
- Cast: Nanoka Hara, Hokuto Matsumura, Eri Fukatsu
- Running time: 2h 2m
- Rating: PG
“After she unknowingly opens a door of chaos, 17-year-old Suzume joins forces with a young man to help prevent more calamity from befalling Japan.”
One Piece Film: Red (2022)
The cast of One Piece Film: Red. Image source: Toei Animation - Director: Gorō Taniguchi
- Cast: Mayumi Tanaka, Kazuya Nakai, Akemi Okamura
- Running time: 1h 55m
- Rating: PG-13
“A new adventure begins for Luffy and his crew when mysterious pop superstar Uta unveils her identity — and launches a misguided plan for world peace.”
Society of the Snow (2024)
Agustin Della Corte as Tintin in Society of the Snow. Image source: Quim Vives/Netflix - Director: J. A. Bayona
- Cast: Enzo Vogrincic, Agustín Pardella, Matías Recalt
- Running time: 2h 25m
- Rating: R
“Following a plane crash in the remote heart of the Andes, survivors join forces and become each other’s best hope as they navigate their way back home.”
May December (2023)
Natalie Portman as Elizabeth Berry and Julianne Moore as Gracie Atherton-Yoo in May December. Image source: Francois Duhamel/Netflix - Director: Todd Haynes
- Cast: Natalie Portman, Julianne Moore, Charles Melton
- Running time: 1h 57m
- Rating: R
“Decades after their scandalous relationship made headlines, a couple starts to unravel when a famous actor arrives to research them for her new film.”
The Killer (2023)
Michael Fassbender in The Killer. Image source: Netflix - Director: David Fincher
- Cast: Michael Fassbender, Tilda Swinton, Arliss Howard
- Running time: 1h 59m
- Rating: R
“After a fateful near miss, an assassin battles his employers — and himself — on an international hunt for retribution he insists isn’t personal.”
Spider-Man: Across the Spider-Verse (2023)
Miles Morales in Spider-Man: Across the Spider-Verse. Image source: Sony Pictures - Directors: Joaquim Dos Santos, Kemp Powers, Justin K. Thompson
- Cast: Shameik Moore, Hailee Steinfeld, Brian Tyree Henry
- Running time: 2h 20m
- Rating: PG
“Teen Miles Morales teams up with Gwen Stacy on a new adventure, facing sinister foe The Spot and a vast legion of parallel heroes in the Multiverse.”
Nimona (2023)
Chloë Grace Moretz as Nimona. Image source: Netflix - Director: Nick Bruno & Troy Quane
- Cast: Chloë Grace Moretz, Riz Ahmed, Eugene Lee Yang
- Running time: 1h 42m
- Rating: PG
“A knight framed for a tragic crime teams with a scrappy, shape-shifting teen to prove his innocence. But what if she’s the monster he’s sworn to destroy?”
All Quiet on the Western Front (2022)
Felix Kammerer, center, in Netflix’s WWI movie “All Quiet on the Western Front.” Image source: Reiner Bajo/Netflix - Director: Edward Berger
- Cast: Felix Kammerer, Albrecht Schuch, Aaron Hilmer
- Running time: 2h 28m
- Rating: R
“When 17-year-old Paul joins the Western Front in World War I, his initial excitement is soon shattered by the grim reality of life in the trenches.”
Klaus (2019)
Klaus on Netflix. Image source: Netflix - Director: Sergio Pablos
- Cast: Jason Schwartzman, J.K. Simmons, Rashida Jones
- Running time: 1h 37m
- Rating: PG
“After proving himself to be the worst student at the academy, a postman is sent to a frozen town in the North where he discovers a reclusive toymaker named Klaus.”
Hustle (2022)
(L-R) Tobias Harris as himself and Juancho Hernangomez as Bo Cruz in the Netflix movie “Hustle.” Image source: Scott Yamano/Netflix - Director: Jeremiah Zagar
- Cast: Adam Sandler, Queen Latifah, Ben Foster
- Running time: 1h 58m
- Rating: R
“After a down-on-his-luck basketball scout discovers an extraordinary player abroad, he brings the phenom back without his team’s approval.”
The End of Evangelion (1997)
The End of Evangelion is streaming on Netflix. Image source: Toei Company - Director: Kazuya Tsurumaki & Hideaki Anno
- Cast: Megumi Ogata, Megumi Hayashibara, Yūko Miyamura
- Running time: 87 minutes
- Rating: TV-MA
“NERV face off against the Eighteenth Angel, humanity itself, but in the end the fate of the world depends upon Shinji’s choices.”
Marriage Story (2019)
Marriage Story is streaming on Netflix. Image source: Netflix - Director: Noah Baumbach
- Cast: Scarlett Johannson, Adam Driver, Laura Dern
- Running time: 2h 17m
- Rating: R
“A stage director and his actor wife struggle through a gruelling, coast-to-coast divorce that pushes them to their personal and creative extremes.”
The Mitchells vs. the Machines (2021)
The Mitchells vs. the Machines is streaming on Netflix. Image source: Netflix - Director: Mike Rianda
- Cast: Abbi Jacobson, Danny McBride, Maya Rudolph
- Running time: 1h 54m
- Rating: PG
“Young Katie Mitchell embarks on a road trip with her proud parents, younger brother and beloved dog to start her first year at film school. But their plans to bond as a family soon get interrupted when the world’s electronic devices come to life to stage an uprising. With help from two friendly robots, the Mitchells must now come together to save one another — and the planet — from the new technological revolution.”
The Power of the Dog (2021)
BENEDICT CUMBERBATCH as PHIL BURBANK in THE POWER OF THE DOG. Image source: Netflix - Director: Jane Campion
- Cast: Benedict Cumberbatch, Kirsten Dunst, Jesse Plemons
- Running time: 2h 6m
- Rating: R
“A domineering rancher responds with mocking cruelty when his brother brings home a new wife and her son, until the unexpected comes to pass.”
RRR (2022)
Ram Charan in RRR. Image source: DVV Entertainment - Director: S. S. Rajamouli
- Cast: N. T. Rama Rao Jr., Ram Charan, Ajay Devgn
- Running time: 3h 2m
- Rating: TV-MA
“A tale of two legendary revolutionaries and their journey far away from home. After their journey they return home to start fighting back against British colonialists in the 1920s.”
The Sea Beast (2022)
Zaris-Angel Hator as Maisie Brumble, Jared Harris as Captain Crow, Karl Urban as Jacob Holland, and Marianne Jean-Baptiste as Sarah Sharpe in The Sea Beast. Image source: Netflix - Director: Chris Williams
- Cast: Karl Urban, Zaris-Angel Hator, Jared Harris
- Running time: 1h 59m
- Rating: PG
After spending the first two decades of his career at Disney working on the likes of Mulan, Bolt, Big Hero 6, and Moana, director Chris Williams charted a new course with Netflix. His first movie after leaving Disney was The Sea Beast, which is a thrilling animated adventure about the young orphan girl Maisie Brumble (Zaris-Angel Hator), who joins the sea monster hunter Jacob Holland (Karl Urban) on his quest to slay the elusive Red Bluster for the King and Queen. Along the way, they learn that the legend of the monsters might not line up with reality.
We’ll be back each month with updates to this list as movies join and leave the Netflix library. You can also check out all of the new releases on Netflix here.