Latest Technology News

Overcoming real-time data integration challenges to optimize for surgical capacity and better care

Healthcare data

In the healthcare industry, surgical capacity management is one of the biggest issues organizations face. Hospitals and surgery centers must be efficient in handling their resources. The margins are too small for waste, and there are too many patients in need of care. Data, particularly real-time data, is an essential asset. But it is only useful if the pieces fit together, solving a puzzle of coordinating schedules, operating room availability, and resource allocation, while ensuring immediate access to patient data for perioperative teams.

Data management demands are significant, complex, and dynamic. Because each patient is unique, anything can happen in an operating room (OR) at any moment. As such, real-time data capture is crucial for surgical workflows. When surgical teams have all the information they need in real time, they can make rapid decisions that not only maximize OR utilization and minimize delays but also enhance overall patient care and safety.

Continue reading

From Windows XP to Windows 10 -- How Microsoft's end-of-life nag screens have changed

Microsoft has evolved its approach to warning users about the end of life (EOL) of its Windows operating systems over the years. The methods and techniques used, from Windows XP onwards, have varied, ranging from the polite to the downright aggressive (we're looking at you, Windows 7).

This journey, revealed in a new video, highlights how Microsoft's strategy has shifted to ensure users are aware of when their operating system will no longer receive support, emphasizing the importance of security and system updates and, in some cases, upgrading you against your will without warning (we're still looking at you, Windows 7).

Continue reading

Pour one out for the Linux homies: Fedora 40 released

Fedora Linux 40 has officially landed (download here), bringing a slew of updates across its various desktop environments and tools aimed at enhancing user experience and developer capabilities. This release delivers updates to both the GNOME and KDE desktop environments, and the reintroduction of the Fedora Atomic Desktop brand.

In the Fedora Workstation Edition, users will now experience GNOME 46. This update includes a variety of enhancements that aim to improve usability and performance. Those interested in the specifics of what’s new in Fedora Workstation 40 can find detailed updates and features highlighted in the release notes.

Continue reading

Phishing attacks up 60 percent driven by AI

A new report reveals a year-on-year increase of nearly 60 percent in global phishing attacks, fueled in part by the proliferation of generative AI-driven schemes such as voice phishing (vishing) and deepfake phishing.

The report from Zscaler ThreatLabz shows that in 2023 the US (55.9 percent), UK (5.6 percent) and India (3.9 percent) are the top countries targeted by phishing scams. The high level of phishing in the US is attributable to its advanced digital infrastructure, large population of internet-connected users and extensive use of online financial transactions.

Continue reading

Samsung begins mass production of 1Tb 9th-Gen V-NAND

Samsung has started mass production of its one-terabit (Tb) triple-level cell (TLC) 9th-generation vertical NAND (V-NAND). This is seemingly aimed at strengthening the company’s position in the NAND flash market, particularly within the high-performance solid state drive (SSD) segment.

SungHoi Hur, Head of Flash Product & Technology at Samsung’s Memory Business, commented on the launch: “With the industry’s first 9th-gen V-NAND, we aim to meet the growing demand for high-performance, high-density SSD solutions that are suitable for AI and other future applications.”

Continue reading

Get 'Coding with AI For Dummies' (worth $18) for FREE

Coding with AI For Dummies introduces you to the many ways that artificial intelligence can make your life as a coder easier. Even if you’re brand new to using AI, this book will show you around the new tools that can produce, examine, and fix code for you.

With AI, you can automate processes like code documentation, debugging, updating, and optimization. The time saved thanks to AI lets you focus on the core development tasks that make you even more valuable.

Continue reading

Meta introduces Horizon OS

In what appears to be a response to Apple's recent success with the Vision Pro, Meta has unveiled its own open computing initiative with the introduction of Meta Horizon OS. This new mixed reality operating system is part of Meta's strategy to recover ground in the rapidly evolving metaverse sector, where Apple has set a high standard.

Meta Horizon OS will be the backbone for a series of new devices from major tech players like ASUS, Lenovo, and Xbox. These collaborations seem to be Meta's attempt to broaden its ecosystem and challenge Apple's dominance. ASUS's Republic of Gamers, for instance, will develop a performance gaming headset, tapping into the gaming market where Apple's presence is less pronounced. Lenovo is poised to leverage its past collaboration on Oculus Rift S and its hardware prowess to create mixed reality devices aimed at productivity and entertainment, sectors where Apple's Vision Pro has made significant inroads.

Continue reading

Open-source audio editor Audacity 3.5 available for Windows, Linux, and Mac

Audacity, the renowned open-source audio editing software, has just been updated to version 3.5, and it's packed with features that are bound to excite both amateur and professional audio manipulators alike.

One of the most anticipated additions in Audacity 3.5 is the introduction of cloud project saving. Now, users can save their projects to audio.com, enabling them to access their work from any device. This move not only facilitates seamless collaboration and sharing among users but also ensures that you can recover previous versions of your projects, which is a lifesaver if you encounter unexpected issues.

Continue reading

Stop sideloading headaches on Apple devices: Why EU admins need MDMs now more than ever

Apple just went full Android in the EU. While sideloading, the act of installing apps from sources other than the OS's official app store, is a familiar practice for Android users, it marks a departure from the tightly integrated ecosystem that has long characterized Apple's approach.

While the option to pick and choose the apps on their devices holds appeal for certain enterprises, EU admins might not agree. Maintaining a delicate equilibrium between user privacy and strong endpoint security has always been a challenge, one that is bound to escalate with the EU's latest regulatory changes.

Continue reading

Email still the most popular phishing technique even on mobile

mobile phishing

Most incidents of phishing or spoofing on smartphones still happen via email, according to MEF's (Mobile Ecosystem Forum) 9th Annual Trust Study.

The report shows 52 percent of users reporting personal experience of data harm via this channel. Surprisingly, 39 percent of those users still took no preventative measures to protect their online data.

Continue reading

Proton Mail launches Dark Web Monitoring to alert users to leaks

security alert

One of the most common forms of cyberattack is credential stuffing, using exposed details on different sites to exploit the fact that people frequently reuse passwords.

Proton Mail is introducing a new Dark Web Monitoring feature that will alert customers if their credentials are exposed on the dark web, where stolen emails and credentials get bought and sold.

Continue reading

Cloud security and speed -- how fast do your processes need to be? [Q&A]

Cloud data protection

Moving to the cloud offers many benefits for businesses, but it doesn't remove the need to keep your systems secure. The tools that make the cloud fast and attractive for business can also be used by attackers.

We spoke to Anna Belak, director, Office of Cybersecurity at Sysdig to discuss the pain points that she sees security teams dealing with today, where those problems come from, and how to address them around process and skills rather than just looking at the tech side.

Continue reading

Updated, lightweight Microsoft Store offers faster downloads and multi-app parallel installations

Microsoft Store update

In response to user feedback, Microsoft has launched Microsoft Store installers for web with refined workflow and faster app downloads.

The changes only apply to Store apps installed directly from apps.microsoft.com, but for anyone using this approach rather than the Microsoft Store app, there are great improvements to the UX. Fewer clicks are now needed to locate and install an app, individual installations are faster, and parallel installation of multiple apps are possible.

Continue reading

The unseen ethical considerations in AI practices: A guide for the CEO 

Artificial Intelligence (AI) is only accelerating its adoption among global corporate enterprises, thus CEOs and business leaders are positioned at the confluence of innovation and ethics, as it relates to implementing AI projects, in their businesses. 

While technical prowess and business potential are usually the focus of conversations around AI, the ethical considerations are sometimes overlooked, especially those not immediately obvious. From a perspective that straddles the line of business leadership and technical acumen, there are five critical, yet often missed, ethical considerations in AI practices that should be part of your due diligence in starting any AI projects: 

Continue reading

The rise of the outsmarted insider

web threats

Malware, ransomware, and phishing. These are just a few examples of software disruptors that can wreak havoc on a business and cause major personal and financial loss.

Most recently, organizations and vendors have gotten good at protecting their business from malware and infiltrations from the outside. Their security has gone up, so it's now more difficult and expensive for an outside attacker to attack this traditional way. Additionally, organizations have gotten smarter about preventing ransomware and not falling for the ransomware attack by paying the ransom. Most organizations won't pay the ransom anymore because governments don't want them to.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.