Searching for business ideas: Three effective approaches for robotics

robot call center

Startups are the new gold rush. It’s trendy to be smart, it’s trendy to have your own business, and it’s trendy to invent. If the stories of your mother's best friends' twenty-something year old children being Silicon residents make you a bit snarky, don’t miss a moment. The year 2020 is all about opportunities. Especially for robo-geeks.

Read our three pieces of advice for finding free niches for your project, and pick up ideas that are just in front of you!

Continue reading

Intel unveils Thunderbolt 4

Thunderbolt 3 has been a game-changer for many consumers, allowing them to connect very powerful docking stations and fast external SSDs to their laptops. While the third-gen of Thunderbolt has been more popular than previous generations, it still hasn't gained huge adoption by computer makers. Sure, Apple and some Windows laptop manufacturers have embraced it, but good ol' USB-A still reigns supreme. It doesn't help that most AMD-powered computers don't have TB3. This will likely change when Thunderbolt 3 is folded into the upcoming USB 4.0 standard.

Intel isn't satisfied to rest on its laurels, however, as it is continuing to push boundaries. Technology must be moved forward, and today, Intel officially announces Thunderbolt 4! And yes, it uses the same USB-C connector. If you are concerned about all of your existing Thunderbolt 3 devices becoming obsolete -- don't be. Intel promises all TB3 and USB-C devices will be compatible with TB4. Best of all, TB4 will add protections to help prevent the kind of vulnerabilities found in TB3.

Continue reading

KeePassXC 2.6.0 released with completely overhauled interface and Have I Been Pwned checks

KeePass has long made life easier when it comes to managing an ever-growing list of passwords for websites, online accounts and so on. Now with the release of KeePassXC 2.6.0, users are being treated not only to a redesign -- including a dark mode option -- but also new features including offline database password health checks.

The program now features comprehensive reports about passwords stored in its database, including checking with security service Have I Been Pwned to see if any have been involved in password breaches. But there's more.

Continue reading

Fake content drives online fraud

Fake/genuine

Based on a study of 34,000 sites and apps, as well as a survey of over 1,000 consumers conducted in June 2020, new research details how content abuse is a critical part of the fraud supply chain, the interconnected ecosystem of fraud.

The research, carried out by digital trust and safety firm Sift, also uncovered a fraud ring based in Russia where fraudsters executed a card-testing scheme through fake listings on an e-commerce marketplace.

Continue reading

Microsoft pushes out another update to PowerToys for Windows 10

PowerToys

Ah, PowerToys… how much we love thee! After reviving the much-loved utilities for Windows 10, Microsoft has wasted no time in releasing update after update, adding more and more tools and refining this incredible software.

It's only a week since the release of PowerToys v0.19.0, but the development team already has a new version for you to try out.

Continue reading

Security not keeping pace with moving to BYOD

BYOD key

With a shift to remote working many more businesses are embracing BYOD, but a new report from Bitglass suggests that security arrangements are failing to keep pace.

In the study, 69 percent of respondents say that employees at their companies are allowed to use personal devices to perform their work, while 26 percent also enable BYOD for contractors, 21 percent for partners, and some even for customers, and suppliers.

Continue reading

Over 15 billion sets of credentials in circulation on criminal marketplaces

stolen credentials

New research from risk prevention specialist Digital Shadows finds there are more than 15 billion sets of usernames and passwords in circulation in cybercriminal marketplaces -- the equivalent of more than two for every person on the planet.

The number of stolen and exposed credentials has risen 300 percent from 2018 as the result of more than 100,000 separate breaches. Of these, more than 5 billion were assessed as 'unique' -- that is not advertised more than once on criminal forums.

Continue reading

MobileIron launches phishing protection for enterprise mobile devices

mobile phishing

Credential theft via social engineering is a major cause of data breaches, but with a more dispersed workforce it becomes harder to guard against.

Security platform MobileIron is launching a new multi-vector mobile phishing protection solution for iOS and Android devices to help organizations defend themselves.

Continue reading

Microsoft launches Project Freta to detect malware in Linux kernels

Microsoft Project Freta

Microsoft has revealed a new anti-malware service by the name of Project Freta. The company describes it as a "free service from Microsoft Research for detecting evidence of OS and sensor sabotage, such as rootkits and advanced malware, in memory snapshots of live Linux systems".

Project Freta is cloud-based, and the memory forensics tool was created by the NExT Security Ventures (NSV) team in Microsoft Research.

Continue reading

Microsoft takes another step towards killing off the Control Panel in Windows 10

Colorful Microsoft logo

Since the days of Windows 8, operating system settings have been split across the traditional Control Panel and the newer Settings. Over time, Microsoft has gradually tried to encourage people away from the Control Panel, burying it deeper and deeper in Windows.

Now the company has taken yet another step that signals the end of the line for the Control Panel you've come to know and love. In the latest builds of Windows 10, the System applet has been rendered all but redundant.

Continue reading

Apple Music time-synced lyrics now available on Samsung smart televisions

There are many music streaming services these days, such as Spotify, Tidal, and YouTube Music. My favorite, however, is Apple Music. Why? Well, besides the excellent mobile interface, it has a very large library of music. Not to mention, the human-curated playlists are second to none. Plus, Apple Music finally has a web player now -- a much desired feature.

Another cool aspect of Apple Music is time-synced lyrics. When you are listening to some songs (not all), you can have the lyrics display on your device's screen -- timed to the music. It works great, and it is even an option on Apple TV, enabling you to have a karaoke-like sing-along with friends and family. Apple Music is no longer just an Apple-only affair though, as it is available on Android devices and some smart televisions too. Today, Samsung announces that the aforementioned Apple Music time-synced lyrics feature is finally available on its smart TVs.

Continue reading

MAINGEAR TURBO is an impossibly small AMD Ryzen 3000XT gaming desktop

If you want a proper gaming PC, you need a full ATX motherboard and a massive tower full of fans, right? Actually, no. Nowadays, there are very capable mini ITX and micro ATX motherboards, making it possible to have a lot of power in a small package.

But holy cow, I never expected to see this much power crammed into such a small space! Today, MAINGEAR launches the TURBO -- a beautiful and impossibly small AMD Ryzen 3000XT gaming desktop. Just how small is it? A very impressive 7" x 14.4" x 12.3". This diminutive liquid-cooled beast can be configured with a processor ranging from the AMD Ryzen 5 3600 to the 3950X -- including the new 3000XT chips. You can choose up to 16TB of storage and up to 64GB of RAM. Graphics cards from both NVIDIA and AMD are available.

Continue reading

Debunking four object storage myths


There is no arguing the fact that data continues to grow at an exponential rate, particularly unstructured data, which is predicted to represent 80 percent of all data by 2025. And because of trends likes IoT, the continued proliferation of mobile devices and the rise of remote work, this growing data is being used and accessed in new ways.

At the same time, it’s become increasingly clear that traditional SAN and NAS storage technologies cannot scale to meet these data growth demands nor support the need for data to be readily accessible from anywhere and at any time. To ensure these surging volumes of data are accessible and manageable, more and more enterprises are turning to object storage to meet their storage needs. However, there are still several misconceptions that persist about object storage. Here are four myths about the technology debunked.

Continue reading

How to avoid common cloud migration challenges

Most IT architectures are complicated. If you’re considering migrating to the cloud, you’re right to be concerned about the many changes that will be required of your architecture and your organization as you make your transition. Cloud migration challenges continue to give organizations anxiety, even though the cloud has been around for nearly 20 years.

Of course, nobody embarks upon a cloud migration expecting to fail. The basic problem is that few people understand the hidden challenges of such a complex project, particularly as it relates to ongoing processes and operations. Unexpected challenges are the curse of any major undertaking, and cloud migrations are truly full of unexpected challenges.

Continue reading

How COVID-19 changed the future of work

COVID-19 forced businesses across the globe to rapidly adopt remote work in order to adhere to social distancing and stay-at-home orders. For some companies, this transition was seamless, especially those that already implemented cloud and the necessary supporting tools within their organizations. Others struggled to adapt their workforces to this highly remote, cloud-first environment. In fact, 41 percent of enterprises have not taken any steps to secure access for their remote workers despite the fact that 65 percent enable personal devices to access managed applications.

To quickly support remote work, organizations were spurred to adopt cloud and allow employees to access the corporate network from unmanaged devices. However, cloud and BYOD environments call for specific security solutions, and organizations that failed to simultaneously implement the necessary controls also expose themselves to more risks, including insider threats. Even once stay-at-home orders are lifted and some businesses choose to return to the workplace, COVID-19 had such an impact on the way we work, making it likely that the following post-pandemic predictions may occur.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.