Latest Technology News

Say goodbye to Microsoft Windows 11 and hello to Nitrux Linux 3.4.1

Nitrux has officially released version 3.4.1. Codenamed “mi,” this update promises to improve the overall user experience with several key software updates, security enhancements, and powerful new tools.

One of the notable enhancements in Nitrux 3.4.1 is the introduction of safe-rm, a safety tool designed to prevent the accidental deletion of important files. This update comes with a functional replacement of the previously included, but non-functional, saferm script. Additionally, PowerTOP—a tool aimed at diagnosing and improving power management—is now included along with an OpenRC service script to apply power-saving settings automatically on boot.

Continue reading

Opera introduces new AI image generation and voice output features in latest update

Opera continues to expand the capabilities of its browser with the introduction of new AI-driven features. The latest update to the Opera One Developer stream has introduced some very cool enhancements, including image generation and voice output capabilities, through its native AI, Aria.

Aria, Opera’s browser-based AI, now allows users to generate images directly from text prompts. This feature, powered by Google’s Imagen2 model, enables users to create unique visual content simply by describing their ideas in words. For instance, users can ask Aria to generate an image of a dog enjoying a vacation on a beach. If the initial result doesn’t meet expectations, there’s an option to regenerate the image with modifications, such as adding a drink or changing the color of the dog’s sunglasses.

Continue reading

It's time to get proactive on the UK's critical national infrastructure (CNI) security -- but where to start?

Risk dial

The critical national infrastructure that underpins the UK has undergone a tremendous amount of digital transformation in recent years. Areas like water treatment, energy and food production are still heavily reliant on operational technology (OT) systems that were often designed and implemented long before the digital revolution.

Digitizing these systems and connecting them to standard IT networks has allowed operators to boost efficiency and bring in practices like remote working and data collection that weren’t possible in an analogue environment.

Continue reading

Transcend unveils MTE560P M.2 SSD

Transcend has unveiled its latest solid state drive. Called “MTE560P,” this drive features 112-layer 3D NAND Flash technology. It has a compact design with dimensions measuring 80 mm by 22 mm by 3.88 mm and weighs just 9 grams. It adopts the M.2 2280 form factor with a NVMe PCIe Gen4 x4 interface. The storage capacity is 160GB only.

Performance metrics for the SSD are good, with sequential read and write speeds reaching up to 3,800 MB/s and 3,000 MB/s, respectively. The drive also delivers respectable random 4K read/write input/output operations per second (IOPS) with up to 190,000 read IOPS and 420,000 write IOPS. It boasts a mean time between failures (MTBF) of 3,000,000 hours and supports up to 5,580 terabytes written (TBW) over its lifespan. The drive writes per day (DWPD) rating is 31.8 over a three-year period.

Continue reading

UK rolls out new consumer safeguards for smart devices

From today all new internet connected smart devices sold in the UK will be required by law to meet minimum-security standards.

The UK becomes the first country in the world to legally require manufacturers to protect consumers from hackers and cyber criminals accessing devices with internet or network connectivity.

Continue reading

Microsoft is optimizing Windows 10 update delivery just as it did with Windows 11

Hand holding Windows 10 logo

Having already taken steps to decrease the size of updates for Windows 11, Microsoft is doing the same for Windows 10.

The company describes this by suggesting that "Windows 10 is becoming more like Windows 11", although this is something of a stretch. What it means in practice is that Microsoft has used various techniques, including removing reverse differentials from the cumulative update package, to shrink update sizes quite considerably.

Continue reading

Understanding the good and bad of no-code solutions [Q&A]

In an era where accessibility is key, companies are increasingly turning to no-code platforms to simplify complex technical processes.

But what fundamental principles should organizations adopt when striving to make intricate technical workflows accessible to a broader audience via no-code? To find out we spoke to Michal Koor, CEO and co-founder of of no-code platform Vectary.

Continue reading

Ubuntu Linux 24.10 is named 'Oracular Oriole'

Canonical has revealed the name for its next release: Ubuntu Linux 24.10 will be known as "Oracular Oriole." Beyond the catchy alliteration, what does this name tell us about the upcoming version? The truth is, not much yet.

"Oracular Oriole" is a title shrouded in mystery, much like the oriole bird itself, which is known for its vibrant appearance and elusive nature. The name sparks curiosity and invites speculation about what new features and improvements might be on the horizon for this popular Linux distribution.

Continue reading

How threat intelligence can improve vulnerability management outcomes

It might surprise you to know that more than 70 new vulnerabilities are published every day. And despite their risk-reducing value in helping SOC teams address these, vulnerability management solutions have drawbacks. Often, they only provide a snapshot of an organization’s vulnerabilities at a point in time. In fact, owing to their nature, vulnerabilities identified today may not exist tomorrow, or they may appear and disappear intermittently. This leaves security teams scrambling to understand not only what the risk is, but how it affects them and where they should start first with any remediation.

Often vulnerability management solutions struggle to support SOC teams effectively, meaning they face an uphill battle with fragmented tools and data silos. This in turn creates major challenges around alert fatigue and overloaded SOC teams who, despite all the tools available to them, end up undertaking manual investigations to determine the best response.

Continue reading

Ubuntu Linux-based Voyager 24.04 LTS unites GNOME and Xfce

The latest release in the world of Linux, Voyager 24.04 LTS, introduces a novel approach by combining two popular desktop environments, GNOME and Xfce, into a single distribution. Based on Ubuntu’s “Noble Numbat” and powered by the Linux 6.8 kernel, this version offers a unified experience designed for both PC and tablet platforms.

Voyager 24.04 LTS features a seamless integration of GNOME 46 and Xfce 4.18, maintaining distinct identities for each environment while sharing a common base. This allows for a simplified user interface where applications specific to one environment do not clutter the other, unless necessary.

Continue reading

Kioxia unveils TransMemory U304 USB flash drive

Kioxia has announced its new TransMemory U304 series of USB flash drives. One of the key attributes of the TransMemory U304 series is the slide-click mechanism that allows users to extend and retract the USB-A connector with a single push. This feature includes an auto-return mechanism that retracts the connector automatically once disconnected, helping to prevent damage during transport.

The U304 series comes in three color options: light blue, magenta, and black, offering users a choice based on their personal preference. Additionally, the flash drives are designed with a strap hole, allowing them to be easily attached to bags or keychains, which enhances portability and reduces the risk of losing the device.

Continue reading

Microsoft and Estée Lauder transform the beauty industry with AI

Today, Estée Lauder Companies (ELC) and Microsoft unveil their latest initiative: the AI Innovation Lab. This venture builds on their ongoing global partnership, aiming to harness generative AI capabilities from Microsoft’s Azure OpenAI Service to revolutionize ELC’s portfolio of over 20 prestige brands.

This collaboration is designed to foster closer consumer relationships and accelerate product launches with a focus on local relevance, highlighting the companies’ commitment to leading the charge in the digital transformation of the beauty industry.

Continue reading

Microsoft and IBM open source MS-DOS 4.00

Microsoft, in partnership with IBM, has released the source code of MS-DOS 4.00 under the open-source MIT license. This release comes a decade after Microsoft first made the source code for MS-DOS 1.25 and 2.0 available to the public through the Computer History Museum.

The decision to release the MS-DOS 4.00 source code was inspired by the discovery of early, unreleased beta binaries by researcher Connor “Starfrost” Hyde. Hyde’s discovery stemmed from a conversation with former Microsoft Chief Technical Officer Ray Ozzie, who unearthed the binaries among floppies sent to him during his tenure at Lotus. Intrigued by the software’s historical value, Hyde approached the Microsoft Open Source Programs Office (OSPO) to explore the possibility of making these resources publicly available.

Continue reading

Software file converters: How they work and why you need them

In today's digital world, we deal with a vast array of file formats daily, from documents and images to videos and audio files. However, not all software or devices can open every document type, leading to compatibility issues. This is where file converter software comes into play, making our digital lives more convenient and efficient.

A file converter is a tool that allows you to convert one format into another. It acts as a digital translator, ensuring that your documents can be opened and used across different platforms, devices, and software applications. Whether you need to convert a Word document to PDF, an image from JPEG to PNG, or a video from AVI to MP4, a file converter software can handle the task seamlessly.

Continue reading

Human risk management automation can help beat burnout

Cyber criminals are relentlessly exploiting new technologies to improve their chances of success. As such, security professionals are feeling the pressure of keeping watch against these threats and trying to stay a step ahead of these criminals.

Yet, constantly remaining in a state of high alert is a formula for burnout, stress, and errors. But this doesn't have to be the case. Human risk management automation refers to the use of software tools to automate the processes of monitoring, reducing, and fixing workforce security risks. This can help ease the burden felt by security professionals and aid in improving overall security posture.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.