{"slug": "google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy", "title": "Google touts its tokenmaxxing and capex spending amid AI orgy", "summary": "Based solely on the provided text, the article's title indicates that Google is promoting its increased capital expenditures and \"tokenmaxxing\" (likely a reference to cryptocurrency or token-related initiatives) during a period of intense AI investment. The body of the article does not contain any information about Google, instead listing unrelated headlines about supply chain issues, data sovereignty, and various cybersecurity threats. Therefore, a factual summary of the article's content is that it features a headline about Google's AI spending, but the article body consists entirely of promotional links and headlines for other unrelated technology and security stories.", "body_md": "MOST POPULAR\nEVENTS\n-\nThe Hardware Crunch: How Supply Chain Turbulence Is Forcing a New IT Playbook\nInfrastructure teams are facing a perfect storm: extended hardware lead times, rising costs driven by AI demand, and accelerated platform timelines.\n-\nOvercoming the trade-offs in data sovereignty\nWhat does data sovereignty actually mean for your network, which trade-offs are unavoidable? Learn more.\n-\nFrom Prompt to Exploit: How LLMs Are Changing API Attacks\nModern applications are API-driven, interconnected, and often over-permissioned, making them an ideal target for AI-assisted attacks.\n-\nIdentity Resilience: The New Mandate for Cyber Survival\nJoin Druva experts for a compelling deep dive into what it takes to build an identity-first recovery strategy in this new threat landscape.\n-\nIdentity Resilience: The New Mandate for Cyber Survival\nJoin Druva experts for a compelling deep dive into what it takes to build an identity-first recovery strategy in this new threat landscape.\n-\nUnfriendly Followers: The Black Market For Your Identity\nThey’ll reveal how attackers use your profile as intel and show you how to make yourself harder to target\n-\nHow Agents are Reshaping AI Security\nAI adoption is accelerating and with it comes a new security challenge.\n-\nHow Agents are Reshaping AI Security\nAI adoption is accelerating and with it comes a new security challenge.\n-\nAI Found the Problem. Now What?\nAI is transforming the software development lifecycle, helping teams identify and remediate vulnerabilities before they reach production.\n-\nVirtual Cyber Recovery Sim\nStep into the chaos of a live ransomware breach, test your response skills, and team up with other IT and security pros to outsmart cybercriminals\nAI\n-\nSoftware\nFirefox 151 helps you edit PDFs – and switch OSes\nExport a profile on Windows, restore it on Linux. Extensions and themes too\n-\nSecurity\nAmerica's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames\nI wonder what's in 'external-secret-repo-creds.yaml' and 'AWS-Workspace-Firefox-Passwords.csv'?\n-\nAI + ML\nShadow AI invades the workplace, up 4x in the last year\nEmployers increasingly blind to unauthorized AI use and where their staff are sending proprietary files\n-\nHPC\nAirbus gets HPC-as-a-service supercomputer from Bull\nAerospace giant rents new system over 5 years to help develop new aircraft\n-\nSecurity\nClear your calendar, Drupal user: You have a critically urgent patch to install\nThe org’s staying mum on the details, but Wednesday’s fixes reach back to unsupported 8.9 branches\nInfosec\n-\nSoftware\nFirefox 151 helps you edit PDFs – and switch OSes\nExport a profile on Windows, restore it on Linux. Extensions and themes too\n-\nSecurity\nAmerica's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames\nI wonder what's in 'external-secret-repo-creds.yaml' and 'AWS-Workspace-Firefox-Passwords.csv'?\n-\nAI + ML\nShadow AI invades the workplace, up 4x in the last year\nEmployers increasingly blind to unauthorized AI use and where their staff are sending proprietary files\n-\nHPC\nAirbus gets HPC-as-a-service supercomputer from Bull\nAerospace giant rents new system over 5 years to help develop new aircraft\n-\nSecurity\nClear your calendar, Drupal user: You have a critically urgent patch to install\nThe org’s staying mum on the details, but Wednesday’s fixes reach back to unsupported 8.9 branches\nFOSS\n-\nFirefox 151 helps you edit PDFs – and switch OSes\nExport a profile on Windows, restore it on Linux. Extensions and themes too\n-\nAmerica's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames\nI wonder what's in 'external-secret-repo-creds.yaml' and 'AWS-Workspace-Firefox-Passwords.csv'?\n-\nShadow AI invades the workplace, up 4x in the last year\nEmployers increasingly blind to unauthorized AI use and where their staff are sending proprietary files\n-\nAirbus gets HPC-as-a-service supercomputer from Bull\nAerospace giant rents new system over 5 years to help develop new aircraft\n-\nClear your calendar, Drupal user: You have a critically urgent patch to install\nThe org’s staying mum on the details, but Wednesday’s fixes reach back to unsupported 8.9 branches\n-\nSAP customers warned AI agents could put costs on autopilot\nBilling will be based on 'actions,' whatever those are, leaving enterprises to wonder how fast the meter might run\nFEATURES\n-\nEurope built sovereign clouds to escape US control. Then forgot about the processors\n-\nNobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data\n-\nEurope wants out from under US tech – but first it has to find the exits\n-\nGNOME may rule Ubuntu Resolute Raccoon, but X.org isn't roadkill yet\n-\nOpenClaw, but in containers: Meet NanoClaw\n-\nOpen source registries don't have enough money to implement basic security\n-\nContain your Windows apps inside Linux Windows\n-\nThe Linux mid-life crisis that's an opportunity for Tux-led transformation\n-\nToo much AI for some, too little for others: Why AMD can't win with investors\n-\nHow agentic AI can strain modern memory hierarchies", "url": "https://wpnews.pro/news/google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy", "canonical_source": "https://www.theregister.com/ai-ml/2026/05/19/google-touts-tokenmaxxing-huge-capex-and-ai-agents-at-i/o/5242983", "published_at": "2026-05-19 20:55:22+00:00", "updated_at": "2026-05-19 21:48:22.999014+00:00", "lang": "en", "topics": ["artificial-intelligence", "hardware", "cloud-computing", "cybersecurity", "enterprise-software"], "entities": ["Google", "Druva"], "alternates": {"html": "https://wpnews.pro/news/google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy", "markdown": "https://wpnews.pro/news/google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy.md", "text": "https://wpnews.pro/news/google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy.txt", "jsonld": "https://wpnews.pro/news/google-touts-its-tokenmaxxing-and-capex-spending-amid-ai-orgy.jsonld"}}