Why serverless platforms will unlock a new era of low-code development [Q&A]

As developers look for ways to improve productivity they're moving away from 'no-code' offerings and have their sights set on serverless platforms to help bolster their 'low-code' solutions.

Serverless platforms take tasks like managing application resilience, performance, security and compliance away from developers, allowing them to focus on functionality and innovation. We spoke to Briana Frank, VP of product at IBM Cloud to find out more about how serverless will unlock the next era of low-code.

Continue reading

Microsoft releases PowerToys v0.73.0 with a wealth of updates and new Crop And Lock utility

PowerToys Crop and Lock

Kicking off the v0.73 release cycle, which is "focused on new features, stability and improvements", Microsoft has released PowerToys v0.73.0, complete with a new module -- Crop And Lock.

The latest addition to the PowerToys family is described as making it possible to "crop a current application into a smaller window or just create a thumbnail. Focus the target window and press the shortcut to start cropping". This update also includes a number of bug fixes and a range of new features for existing modules.

Continue reading

Microsoft gives Windows 11's Snipping Tool an important ease-of-use upgrade

Snipping Tool menu

Microsoft has released an updated version of its screen capture and screen recording utility, Snipping Tool. As well as bug fixes there are improvements and additions to the Windows 11 tool.

The latest version of the app introduces a number of key changes including the arrival of the combined capture bar, something Microsoft says simplifies switching between screen grabbing and screen recording. There are also changes to audio recording options.

Continue reading

Nintendo’s Mario Red OLED Switch is the perfect prelude to Super Mario Bros. Wonder

If you're a Nintendo aficionado like me, then you're probably already buzzing from Nintendo's recent Super Mario Bros. Wonder Direct video. The presentation gave us a deep dive into the upcoming Super Mario Bros. Wonder, which hits stores on October 20. The game promises to rejuvenate the 2D Mario experience like never before. And just when you thought it couldn't get any better, Nintendo also dropped a major bombshell — a new Mario-themed Nintendo Switch OLED Model is joining the fray!

Before we dive into the new Switch model, let's take a moment to marvel at the game that's causing all this excitement. Super Mario Bros. Wonder is the first 2D side-scrolling Mario game in over a decade, folks! With new gameplay elements, power-ups, and something called "Wonder Flowers" that bring unexpected transformations to the table, this game is slated to redefine Mario as we know it. A new Flower Kingdom awaits exploration, and a roster of playable characters ensures that the fun will be varied and endless.

Continue reading

Microsoft Edge gains a secret option for screen grabbing videos

Blurry Microsoft Edge logo with mobile in foreground

It is usually the case that when a web browser, or any other app for that matter, gets an interesting new feature, the company behind said app shouts about it. Usually, but not always.

A newly discovered option in Microsoft Edge is a good example. Microsoft has made no announcement about it, but has snuck a handy new "Copy video frame" option into the browser that makes it possible to grab a still from a video.

Continue reading

Defender bypass allows threats to be removed from protection database

Microsoft Defender on a laptop

A lot of people rely on Windows Defender to protect their systems, it's free and installed by default so why not?

Defender uses a blacklisting approach to stop threats. Before allowing a file to execute, it will compare it against its database of known threats and stop it from executing if it's on there. However, researchers at SafeBreach have uncovered an exploit that can allow threats to be removed from the database.

Continue reading

addlink launches AddGame A93 PCIe Gen4x4 M.2 SSD for PC and PS5

Today, addlink Technology Co., Ltd. launches its latest solid state drive. Dubbed “AddGame A93,” this SSD doesn’t have DRAM (in an effort to reduce costs), but it still offers very impressive performance. The drive sports read speeds of up to 7,400MB/s and write speeds up to 6,500MB/s, thanks to its PCIe Gen 4 NVMe interface.

For the Sony PlayStation 5 gamers out there, this SSD could be a dream come true. Not only does it meet the PS5's demanding requirements, but it also fits like a glove in the console's internal expansion bay.

Continue reading

Why "AI" can't succeed without APIs

AI-Security-model

Mega tech trends like the cloud, the mobile phone era, metaverse and now AI all depend on enabling technologies sitting right beneath the surface hidden from nearly everyone’s view. Their structural integrity depends on the flawless operation of those enabling technologies, which in many cases are Application Programming Interfaces (APIs). As such, their success depends on API adoption. Nowhere is this truer than in the rapid proliferation of AI technologies, like generative AI, which require a simple and very easy-to-use interface that gives everyone access to the technology. The secret here is that these AI tools are just thin UIs on top of APIs that connect into the highly complex and intensive work of a large language model (LLM).

It’s important to remember that AI models don’t think for themselves, they only appear to be so that we can interact with them in a familiar way. APIs are essentially acting as translators for AI platforms as they’re relatively straightforward, highly structured and standardized on a technological level. What most people think of as "AI" should be viewed through the lens of an API product; and with that mindset, organizations can best prepare for what potential use cases are possible and how to ensure their workforces have the skills to put them into action.

Continue reading

Half of European enterprises have no formal BYOD policy

BYOD key

The shift to remote and hybrid working has led to many more people using their personal devices for work purposes.

Yet a new survey, from Apple device management specialist Jamf, reveals that 49 percent of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources.

Continue reading

Learning from the recent TOMRA cyberattack: How can manufacturers increase resilience?

The recent cyberattack on TOMRA, a leading recycling entity and crucial cog in the wider manufacturing supply chain, underscores the escalating threat of cybercrime in the manufacturing sector. On July 16, TOMRA's data systems were extensively compromised, leading to significant operational disruptions. The attack's impact varied across the company's infrastructure, with systems taken offline and machines of different generations affected differently.

Manufacturers are at the heart of our global economy. If they are unable to build, ship, or invoice their goods due to a cyberattack, the potential losses can be catastrophic. At the same time, manufacturers are grappling with two distinct cybersecurity issues: updating security for legacy equipment that is vulnerable to lateral movement and securing the migration to Industrial IoT or Industry 4.0.

Continue reading

Microsoft is unbundling Teams from Microsoft 365 and Office 365 to address European antitrust concerns

Microsoft Teams on laptop screen

Microsoft has announced that it will unbundle Teams from Microsoft 365 and Office 365 in the EEA and Switzerland starting in October -- and this will mean a price reduction.  

The move comes after the European Commission expressed concerns about the bundling of the software. Microsoft describes the decision as being part of "proactive changes", and the company will no doubt be hoping that it is enough to stop further probing and legislation. For now, the unbundling is limited to Europe.

Continue reading

Chrome password sharing feature makes it easier to share login credentials... with limitations

Passwords written a notebook on top of a laptop

There are many reasons for wanting to share passwords, and it is surprising -- and also a source of irritation -- that doing so is not easier. But Google is looking to change this by introducing a dedicated password sharing option to Chrome.

Users of the browser will soon be able to use the Password Manager function of the browser to quickly share login details with others. To start with, it appears that Google will limit sharing to people you have added to your Google Family Group, but it is possible that this will be opened up further in future.

Continue reading

JBL Authentics Series: Retro speaker design meets modern technology

Ah, JBL. The name itself resonates with a powerful, legacy-rich reputation in the world of audio. And now, my audio-loving amigos, brace yourselves as the brand is once again set to revolutionize your listening experience. Say hello to the JBL Authentics series. There are three speaker options in this new product line.

Let’s kick things off with the JBL Authentics 300. This portable Wi-Fi and Bluetooth enabled beauty offers a built-in 8-hour battery and delivers sound so full-bodied, it’s like being front-row at a concert. Whether you’re out gardening or dancing in the kitchen, you’re enveloped in 360-degree immersive audio. Move over, live gigs; we’ve got a new star in town.

Continue reading

Businesses must learn to live with ransomware

Last year, 85 percent of organizations were hit by at least one ransomware attack, according to the  Veeam Data Protection Trends Report 2023. With almost all organizations suffering these attacks, it’s clear that the problem is not only widespread but almost inevitable these days. Though this might sound daunting, it’s by acknowledging this fact that we can manage this ever-present threat. So, let’s look at what solutions organizations can utilize to be able to live alongside ransomware.

It’s clear that ransomware attacks are a very real and present threat -- we see this every day, whether we’re watching the national news or sitting in the boardroom. Considering the ubiquity of these attacks, organizations need to be aware that a ransomware attack is no longer a case of ‘if’ you’ll be the target of an attack but ‘how often.’ While a vast number of organizations experienced at least one attack last year, the Veeam Data Protection Trends Report also showed that just under half (48 percent) suffered two or three attacks. This can feel like an overwhelming prospect for an organization of any size, and the natural consequence is that many turn to cyber insurance in search of some peace of mind.

Continue reading

Debian-based antiX-23 (Arditi del Popolo) is the Systemd-free Linux experience of your dreams

If you're one to favor choice, versatility, and independence from the systemd behemoth, then you're in for a treat. Say hello to antiX-23 (Arditi del Popolo), a new release based on Debian Bookworm that stands as a powerful testament to the open-source community's flexibility.

With its myriad flavors and options, this Linux distro invites you to experience computing on your own terms. The new release adds some in-house spices like zzzFM/IceWM as the default desktop and the IceWM Control Centre. Plus, the Onboard virtual keyboard and magnus screen magnifier are now standard.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.