Latest Technology News

We're not going to deal with today's IT admin issues with yesterday's technology

If I were to put you in a time machine and transport you five years into the future, do you know what you’d find in IT administration? Even more complexity, heterogeneity, and increased use of novel new platforms and technologies. And yet IT admins would still be worried and stressed about their security gaps, whilst still managing all user authentication, device management, and access to resources via a piece of legacy, on-premise, software first launched in the year 2000: Active Directory. 

You read that right. That’s 24 years ago. Don’t get me wrong; just because something wasn’t created yesterday doesn’t mean it’s not useful. But what is concerning is that, for all the incredible digital transformation initiatives that SMEs (small to medium enterprises) have initiated in the last few years -- we somehow think that the default option is best. 

Continue reading

AI-powered data management: Navigating data complexity in clinical trials

health apps

The data flood gates have opened wide for clinical trial research. In fact, the amount of data gathered may be more akin to a tsunami or a monsoon. For decades, researchers struggled with a lack of data available in clinical trials; however, they may have received more than they asked for. Research shows that the biopharmaceutical industry generates up to a trillion gigabytes of data annually and clinical trials, one of the principal contributors to these data points, generate an average of up to 3 million data points per trial. This influx of sources can make it challenging to discern relevant from superfluous information, complicating analysis and delaying critical decision-making.

An increase in decentralization paired with expanded collection methods in clinical trials have increased access to and accumulation of data. Information gathered from remote monitoring devices, electronic health records (EHRs), laboratory tests, surveys and questionnaires and third-party databases, all contribute to the data challenge in clinical trials. In reality, the number of touchpoints across clinical trials, from sponsors to clinical research organizations (CROs) to site staff, combined with the complexity and disparity of data sources leads to challenges in ensuring data quality.

Continue reading

Workforces need the skills to defend against AI-enabled threats

Artificial-Intelligence-threat

It’s no secret that artificial intelligence (AI) is transforming software development. From automating routine tasks to enhancing code efficiency and optimizing testing processes, AI is helping developers save time, money, and resources. It can also analyze code to detect bugs, security vulnerabilities, and quality issues more effectively than traditional models. If you’re thinking there’s a "but" coming, you’re right.

The downside to the benefits of leveraging AI technologies in software development is that it can also enhance the capabilities of malware developers. As such, the proliferation of AI is not necessarily fueling new cyberattacks, it is simply creating an even distribution of enhanced proficiency for both legitimate and malicious actors.

Continue reading

Overcoming real-time data integration challenges to optimize for surgical capacity and better care

Healthcare data

In the healthcare industry, surgical capacity management is one of the biggest issues organizations face. Hospitals and surgery centers must be efficient in handling their resources. The margins are too small for waste, and there are too many patients in need of care. Data, particularly real-time data, is an essential asset. But it is only useful if the pieces fit together, solving a puzzle of coordinating schedules, operating room availability, and resource allocation, while ensuring immediate access to patient data for perioperative teams.

Data management demands are significant, complex, and dynamic. Because each patient is unique, anything can happen in an operating room (OR) at any moment. As such, real-time data capture is crucial for surgical workflows. When surgical teams have all the information they need in real time, they can make rapid decisions that not only maximize OR utilization and minimize delays but also enhance overall patient care and safety.

Continue reading

From Windows XP to Windows 10 -- How Microsoft's end-of-life nag screens have changed

Microsoft has evolved its approach to warning users about the end of life (EOL) of its Windows operating systems over the years. The methods and techniques used, from Windows XP onwards, have varied, ranging from the polite to the downright aggressive (we're looking at you, Windows 7).

This journey, revealed in a new video, highlights how Microsoft's strategy has shifted to ensure users are aware of when their operating system will no longer receive support, emphasizing the importance of security and system updates and, in some cases, upgrading you against your will without warning (we're still looking at you, Windows 7).

Continue reading

Pour one out for the Linux homies: Fedora 40 released

Fedora Linux 40 has officially landed (download here), bringing a slew of updates across its various desktop environments and tools aimed at enhancing user experience and developer capabilities. This release delivers updates to both the GNOME and KDE desktop environments, and the reintroduction of the Fedora Atomic Desktop brand.

In the Fedora Workstation Edition, users will now experience GNOME 46. This update includes a variety of enhancements that aim to improve usability and performance. Those interested in the specifics of what’s new in Fedora Workstation 40 can find detailed updates and features highlighted in the release notes.

Continue reading

Phishing attacks up 60 percent driven by AI

A new report reveals a year-on-year increase of nearly 60 percent in global phishing attacks, fueled in part by the proliferation of generative AI-driven schemes such as voice phishing (vishing) and deepfake phishing.

The report from Zscaler ThreatLabz shows that in 2023 the US (55.9 percent), UK (5.6 percent) and India (3.9 percent) are the top countries targeted by phishing scams. The high level of phishing in the US is attributable to its advanced digital infrastructure, large population of internet-connected users and extensive use of online financial transactions.

Continue reading

Samsung begins mass production of 1Tb 9th-Gen V-NAND

Samsung has started mass production of its one-terabit (Tb) triple-level cell (TLC) 9th-generation vertical NAND (V-NAND). This is seemingly aimed at strengthening the company’s position in the NAND flash market, particularly within the high-performance solid state drive (SSD) segment.

SungHoi Hur, Head of Flash Product & Technology at Samsung’s Memory Business, commented on the launch: “With the industry’s first 9th-gen V-NAND, we aim to meet the growing demand for high-performance, high-density SSD solutions that are suitable for AI and other future applications.”

Continue reading

Get 'Coding with AI For Dummies' (worth $18) for FREE

Coding with AI For Dummies introduces you to the many ways that artificial intelligence can make your life as a coder easier. Even if you’re brand new to using AI, this book will show you around the new tools that can produce, examine, and fix code for you.

With AI, you can automate processes like code documentation, debugging, updating, and optimization. The time saved thanks to AI lets you focus on the core development tasks that make you even more valuable.

Continue reading

Meta introduces Horizon OS

In what appears to be a response to Apple's recent success with the Vision Pro, Meta has unveiled its own open computing initiative with the introduction of Meta Horizon OS. This new mixed reality operating system is part of Meta's strategy to recover ground in the rapidly evolving metaverse sector, where Apple has set a high standard.

Meta Horizon OS will be the backbone for a series of new devices from major tech players like ASUS, Lenovo, and Xbox. These collaborations seem to be Meta's attempt to broaden its ecosystem and challenge Apple's dominance. ASUS's Republic of Gamers, for instance, will develop a performance gaming headset, tapping into the gaming market where Apple's presence is less pronounced. Lenovo is poised to leverage its past collaboration on Oculus Rift S and its hardware prowess to create mixed reality devices aimed at productivity and entertainment, sectors where Apple's Vision Pro has made significant inroads.

Continue reading

Open-source audio editor Audacity 3.5 available for Windows, Linux, and Mac

Audacity, the renowned open-source audio editing software, has just been updated to version 3.5, and it's packed with features that are bound to excite both amateur and professional audio manipulators alike.

One of the most anticipated additions in Audacity 3.5 is the introduction of cloud project saving. Now, users can save their projects to audio.com, enabling them to access their work from any device. This move not only facilitates seamless collaboration and sharing among users but also ensures that you can recover previous versions of your projects, which is a lifesaver if you encounter unexpected issues.

Continue reading

Stop sideloading headaches on Apple devices: Why EU admins need MDMs now more than ever

Apple just went full Android in the EU. While sideloading, the act of installing apps from sources other than the OS's official app store, is a familiar practice for Android users, it marks a departure from the tightly integrated ecosystem that has long characterized Apple's approach.

While the option to pick and choose the apps on their devices holds appeal for certain enterprises, EU admins might not agree. Maintaining a delicate equilibrium between user privacy and strong endpoint security has always been a challenge, one that is bound to escalate with the EU's latest regulatory changes.

Continue reading

Email still the most popular phishing technique even on mobile

mobile phishing

Most incidents of phishing or spoofing on smartphones still happen via email, according to MEF's (Mobile Ecosystem Forum) 9th Annual Trust Study.

The report shows 52 percent of users reporting personal experience of data harm via this channel. Surprisingly, 39 percent of those users still took no preventative measures to protect their online data.

Continue reading

Proton Mail launches Dark Web Monitoring to alert users to leaks

security alert

One of the most common forms of cyberattack is credential stuffing, using exposed details on different sites to exploit the fact that people frequently reuse passwords.

Proton Mail is introducing a new Dark Web Monitoring feature that will alert customers if their credentials are exposed on the dark web, where stolen emails and credentials get bought and sold.

Continue reading

Cloud security and speed -- how fast do your processes need to be? [Q&A]

Cloud data protection

Moving to the cloud offers many benefits for businesses, but it doesn't remove the need to keep your systems secure. The tools that make the cloud fast and attractive for business can also be used by attackers.

We spoke to Anna Belak, director, Office of Cybersecurity at Sysdig to discuss the pain points that she sees security teams dealing with today, where those problems come from, and how to address them around process and skills rather than just looking at the tech side.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.