Shutterstock integrates with leading Digital Asset Management platform OpenText
Shutterstock is well known as a provider of quality stock content and tools for brands, businesses and media companies, and it’s just entered into a new partnership with OpenText, a worldwide leader in digital asset management (DAM).
The new API integration will give Shutterstock Enterprise and OpenText customers direct access to over 380 million high-quality Shutterstock images via OpenText Media Management.
Microsoft makes Windows 10 21H2 Build 19044.1200 (KB5005101) available to the Release Preview Channel
Windows 11 might be on its way, but before it gets here there’s another feature update for Windows 10 set to arrive. Today, Windows 10 21H2 gets a little nearer to release with Microsoft making Build 19044.1200 (KB5005101) available to Insiders in the Release Preview Channel.
If you’re already on Windows 10, version 21H2 this update will be offered automatically. If not, you’ll need to get it via the 'seeker' experience in Windows Update, although it will only be offered to Insiders who were moved from the Beta Channel to the Release Preview Channel because their PC did not meet the hardware requirements for Windows 11.
How full-text search engines improve productivity at work
Entering the era of private space travel, you’d think that even if the rest of us can’t yet launch into orbit, at the very least we could make our lives easier through instant search across terabytes of up-to-date enterprise data from any place we may happen to visit on this planet. The good news is, with enterprise search software and a search index, we can make Earth that much more habitable while we await own spacecraft.
Now you may look up at the stars and wonder: what is a search index? A search index is not like the type of index you’d find at the end of a large book. Instead, it is simply an internal tool for storing each unique word and each unique number across an enterprise dataset, and the locations of all words and numbers in the data. The sole purpose of the search index is for the search engine to comprehensively search across everything, processing as many search requests as come in at any one time.
Google Nest Hub comes to LEGOLAND Hotels
About a year ago, we told you that Google was partnering with some hotels to have Nest Hub smart devices installed in guest rooms. Understandably, some people were concerned about having a microphone and camera in their hotel rooms.
However, those worries were unfounded. You see, Nest Hub doesn't even have a camera! Plus, Google is extremely focused on privacy, and the microphone can be totally disabled with a hardware switch. Ultimately, this hospitality partnership was simply a big win for hotel guests as they get to experience the convenience of Google Assistant when away from home.
Data governance -- balancing security against risk [Q&A]
Are you a road warrior or a remote collaborator?
The COVID-19 pandemic has had a major effect on the way most of us work and new research from workplace communication specialist Poly has identified six different workplace personas that make up over 90 percent of a typical enterprise.
The study, carried out by by Factworks, aims to help businesses look at the attributes, pain points, and communication intensity associated with each persona, to better match workstyles and employee behaviors to communication devices and technologies.
Despite the headlines, there's no need to feel hopeless about cybersecurity
The recent Colonial Pipeline attack set off gasoline panic-buying on America’s East Coast and reportedly cost the company $90 million in ransom. An adversarial nation’s Sunburst hack penetrated major U.S. corporations and key government agencies with repercussions yet unknown. Looking at these and other incidents, friends and customers have asked me, "What’s the use? Why bother? If these powerful organizations can be held for ransom or lose key data, what chance does my organization have to defend itself?"
I understand the feelings of helplessness behind the question. It can sometimes seem cybersecurity experts are preaching fire safety while all around us the house is burning down.
ICS vulnerabilities on the rise as attacks increase
Industrial control system (ICS) vulnerability disclosures are increasing as recent high-profile cyberattacks on critical infrastructure and industrial enterprises have made ICS security a mainstream issue.
The latest biannual ICS Risk & Vulnerability Report released today by Claroty shows a 41 percent increase in ICS vulnerabilities disclosed in the first half of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.
Supply network mapping more important than ever
Supply chains have been mapped for forever, but now technology is being increasingly involved in network mapping. Supply chains are evolving due to factors around them which might be political, economic, production-based, or, as seen this year, because of a pandemic. Covid-19 exposed the fragility of many modern supply chains with businesses relying on imports from different countries at a time when manufacturing was decreasing.
Within the wines and spirits industry companies across the world are scaling up their production, streamlining their supply chains, and expanding globally to become more efficient with their suppliers. It’s more important than ever to have an understanding of where everything comes from. You only have to look at the 2013 horse meat scandal to see why knowing your product’s origins is vital.
Zorin OS 16 is the Windows 11-like Linux distribution Microsoft doesn't want you to know about
Windows 11 is a very good operating system, and it hasn't even gone gold yet. In fact, despite only being Beta, I can confidently call it the best version of Windows ever. It is shockingly polished and beautiful -- the true successor to Windows 7. Windows 10 wasn't bad, but it never felt complete. Windows 11 feels purposeful and well-loved by developers. Microsoft has impressed me with the upcoming operating system. It is appearing to be more than a superficial update as I once thought.
With all of that said, understandably, not everyone wants or needs Windows 11. Due to some rather lofty hardware requirements, some consumers will find their computer simply can't run Windows 11 even if they want it to. While Microsoft and the overall computer industry would love to see these consumers buy new computers, that simply is not necessary. Instead, a Linux-based operating system can breathe new life into your aging PC.
Why a 'one-size-fits-all' approach to data classification won't deliver in an era of enhanced regulation
In 2018 the European GDPR irrevocably changed the whole data privacy landscape. Since it was implemented there have been a host of other privacy regulations such as CCPA, CMMC, and India PDP, coming into force around the world. In fact, just a couple of weeks ago the Colorado Governor signed the Colorado Privacy Act (CPA) into law, the latest in the recent wave of state privacy legislation in the US and unlikely to be the last. The CPA will take effect July 1, 2023, six months after Virginia’s Consumer Data Protection Act (CDPA) and the California Privacy Rights Act (CPRA) become effective.
Following the implementation of such data protection and privacy regulations, there have been plenty of high-profile cases and fines issued. This further underpins the need to ensure sensitive information is handled in the correct manner and reinforces that this is a government requirement that organizations can no longer ignore. For example, just this month British Airways settled a legal claim from some of the 420,000 people affected by a major 2018 data breach. The breach affected both customers and BA staff and included names, addresses, and payment-card details. The UK Information Commissioner's Office handed BA its largest fine to date -- £20m -- over the "unacceptable" failure to protect customers.
How long until others copy Apple's Mail Privacy Protection?
When iOS 15 is released this fall, users will have access to enhanced Siri capabilities, new ways to personalize their device, helpful improvements to the Find My iPhone/iPad, and several other new features and functionality to play with. But in the worlds of digital privacy and marketing technology, there's one update in particular that has been sending shockwaves up and down the industry.
Companies who care about email marketing have been in a sort of panic mode ever since the full slate of iOS 15 updates was revealed a couple months ago, due to a new feature called Mail Privacy Protection. In what Apple is calling an advancement of its "privacy leadership," the ability to block marketers from tracking the open behavior of their emails is the first step in what could be a cataclysmic shift for the entire spam (I mean, "email marketing") industry.
Small companies make good targets for cybercriminals
"Cybersecurity doesn’t apply to me because my business is too small to matter", and "Cybercriminals would never bother hacking us because we don’t have valuable data or many financial assets."
If these comments sound familiar, that’s because it is unfortunately the view held by a large majority of the SMB community. Small to medium sized businesses are slowly jumping on the cybersecurity bandwagon, but must first leave this 'it would never happen to me' mentality behind.
Why proactive cybersecurity means focusing on people
Today’s work environment is radically different from that of just 16 months ago. COVID-19 has created a permanent state of hybrid or fully remote work, which, yes, brings a number of benefits, but it also increases employee stress, reduces their attention span, and creates a chasm between them and their internal security team.
We’re living in the new world order, which compounds and amplifies the threats from what have historically been the three most common security incident reasons -- people getting hacked, people making mistakes, and people breaking rules. Not being proactive about potential insider threats almost guarantees an organization that hasn’t been hacked will be doomed to join the many big-name brands that have found themselves having to pay ransom for access to their systems.
This is Google Pixel 5a with 5G
If you are a hardcore Android user, you should buy a Pixel. Google’s smartphones may not have the best specifications, but they do offer the purest Android experience. They are the only way to truly experience Android as Google intends it -- including timely OS updates. They are free of bloat, unlocked, and often very affordable. Best of all, they offer a remarkable photography experience.
Today, Google officially announces the oft-rumored Pixel 5a with 5G. It isn’t a flagship device, but with a reasonable $449 asking price, the Android 11 smartphone looks to be a great value. The 6.34-inch OLED screen features a respectable 2400x1080 resolution, while the 12.2 MP dual-pixel and 16 MP ultrawide rear cameras should take exceptional photos. While it does get water resistance, the Pixel 5a with 5G lacks wireless charging -- you must use USB-C to charge the 4680 mAh battery.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.
