Plugable launches 0.8m Thunderbolt 3 cable with 40Gbps and 100W charging

Thunderbolt 3 is excellent technology -- it is fast and allows laptop users to expand the capabilities of their computers. For instance, you could add a TB3 docking station to gain additional ports, or an external GPU enclosure to add a desktop-class graphics card. So, yeah, Thunderbolt 3 rules.

Unfortunately, to get the full performance of Thunderbolt 3, it usually means using a very short cable, like 0.5m. While longer cables are available, they often provide slower transfer speeds (20Gbps) rather than the faster 40Gbps that TB3 can theoretically achieve. Not to mention, longer cables usually provide lesser charging power. Sure, there are some longer cables that provide top charging and data speeds, such as this 0.8m one from Apple, but as you can see, at $40, it is quite expensive. Today, Plugable launches a new cable (TBT3-40G80CM) that matches the performance of Apple's cable but at much more affordable price!

Continue reading

Shining a light onto the dark web

Dark web hacker

The dark web is, by its very nature something of an object of mystery. It's easy to think of it as a huge, closed community hidden from the world in dusty corners of the internet. But what's the reality?

Threat intelligence specialist Recorded Future has done some research to try to understand the dark web's true nature.

Continue reading

New risk assessment capabilities help secure containers

Red and blue security padlock

Container security company NeuVector is releasing new security risk assessment capabilities for enterprises using Kubernetes in production environments.

The features, added to its existing container security offering, include new dashboard widgets and downloadable reports to provide security risk scores for the most critical run-time attack risks, network-based attacks and vulnerability exploits in containers.

Continue reading

Companies continue to struggle with privileged access management

Admin login

Privileged accounts can be a headache for organizations so you'd expect managing them to be a high priority for security teams. However, a new report from Thycotic reveals that 85 percent fail to achieve even basic privileged security hygiene.

In addition 55 percent have no idea how many privileged accounts they have or where they’re located, while over 50 percent of their privileged accounts never expire or get deprovisioned.

Continue reading

97 percent of companies now use agile development methods

Agile development

Agile is clearly becoming the norm in the development community according to the findings of a new report from CollabNet VersionOne which has been charting the agile landscape for 13 years.

The report shows 97 percent of organizations now practicing agile development methods. That's not to say its use is universal, however, only 22 percent of respondents report that all their teams are agile, 26 percent more than half and 48 percent less than half.

Continue reading

Reported data breaches up more than 56 percent

data breach

According to the latest Data Breach Report from Risk Based Security the number of reported data breaches was up 56.4 percent in the first quarter of 2019 compared to the same period last year.

The increase in reporting could be a result of new legislation like GDPR that obliges businesses to be more open about security issues. The number of exposed records was also up by 28.9 percent. Already in 2019, there have been three breaches exposing 100 million or more records.

Continue reading

It's decision time: Samsung tells buyers it will cancel their Galaxy Fold pre-orders unless told not to

Samsung Galaxy Fold

The launch of the Samsung Galaxy Fold is probably going to go down as one of the most problematic phone launches ever. After review handsets were found to have serious problems with the folding screen, Samsung decided to postpone the release for an unspecified length of time.

With this being one of the first foldable phones, there was obviously a great deal of interest in it, and many people placed pre-orders in spite of the high price. Now the company is giving buyers the chance to back out of their purchase, saying it is "making progress in enhancing" the phone -- but still does not know when (or, indeed, if) it will be ready for launch. In fact, Samsung will be automatically cancelling orders unless it is told to do otherwise.

Continue reading

VisionTek launches VT4500 Dual 4K USB-C Docking Station with Power Delivery

Thunderbolt 3 docking stations, such as this one from IOGEAR, can be a great way to transform your laptop into a makeshift desktop. The problem? Most computers don't have TB3. While that speedy interface is starting to show up on more affordable laptops, it is still, for the most part, reserved for premium machines.

Thankfully, USB-C docking stations exist, allowing more consumers to take advantage of the single-cable dock experience. There are plenty of USB docks on the market, so it can be hard to stand out, but today, VisionTek has done exactly that. Called "VT4500," it is a dual display USB-C Docking station with power delivery. What makes it pretty damn cool is its inclusion of four video outputs on the rear -- 2x DisplayPort and 2x HDMI. Sadly, they can't all be used at once -- you are limited to just two. By offering both connection types for Display 1 and Display 2, VisionTek essentially eliminates the need for adapters. And yes, this thing can push two 4K monitors at 60Hz.

Continue reading

Microsoft's core platform isn't software, it's trust

For the first time in a half-decade, I watched a Microsoft Build keynote this morning. Time gives fresh perspective, looking at where the company was compared to where it is today. Listening to CEO Satya Nadella and other Softies, I repeatedly found myself reminded of Isaac Asimov's three laws or Robotics and how they might realistically be applied in the 21st Century. The rules, whether wise or not, set to ensure that humans could safely interact with complex, thinking machines. In Asimov's science fiction stories, the laws were core components of the automaton's brain—baked in, so to speak, and thus inviolable. They were there by design; foundationally.

Behind all product design, there are principles. During the Steve Jobs era, simplicity was among Apple's main design ethics. As today's developer conference keynote reminds, Microsoft embraces something broader—design ethics that harken back to the company's founding objectives and others that share similar purpose as the robotic laws. On the latter point, Nadella repeatedly spoke about "trust" and "collective responsibility". These are fundamental principles of design, particularly as Artificial Intelligence usage expands and more corporate developers depend on cloud computing platforms like Azure.

Continue reading

Open source champion Microsoft announces Windows Subsystem for Linux 2 (WSL 2) at Build 2019

It used to be, Microsoft was seen as the enemy of Linux. For some folks in the Linux community, that is still the case -- even though that viewpoint is totally wrong. Look, under the leadership of Satya Nadella, Microsoft has transformed itself, becoming a genuine champion of Linux and other open source projects. Anyone that doubts Microsoft's newfound Linux love should look no further than Windows 10 to see it is the real deal. You see, the latest version of Windows contains the Windows Subsystem for Linux (WSL) -- a compatibility layer for developers and others, allowing them to stay within Windows 10 without the need to dual-boot a Linux distro or run one in a virtual machine.

Today, at the Build 2019 developer conference, Microsoft announces the future of this project -- Windows Subsystem for Linux 2. Believe it or not, WSL 2 will ship with an actual Linux kernel, meaning full system call compatibility! This will also allow Microsoft to issue kernel improvements by only updating the kernel -- no need to update the entire WSL. Best of all, WSL 2 will be tremendously faster than WSL 1.

Continue reading

Windows Terminal is a new Linux-inspired command line app for Windows 10

Microsoft’s developer conference Build 2019 is underway, and one of the things that the software giant announced today is a new app for command-line users.

The Windows Terminal is an update of the existing Command Prompt/PowerShell apps and is expected to arrive in the middle of June.

Continue reading

Microsoft announces Internet Explorer mode for Edge to aid enterprise compatibility

As part of this week's Build 2019 Microsoft is announcing a number of enhancements to the Edge browser including an Internet Explorer mode for enterprises.

This is aimed at cutting the need for IT staff to manage multiple solutions. Allowing legacy IE-only content -- such as intranet sites -- to be opened in Edge without the need to change any settings or launch a different browser.

Continue reading

Why firewalls still matter [Q&A]

Firewall

Firewalls have been used to protect networks and endpoints from the very early days of the web. In recent years many people have been predicting its demise, yet the firewall is still with us.

Why is this and how has the firewall evolved to protect enterprises in the 21st century? We spoke to Ruvi Kitov, founder and CEO of network security specialist Tufin to find out.

Continue reading

Watch Microsoft's Build 2019 keynote here

Today is a big day for Microsoft as Build 2019 kicks off with a keynote from CEO Satya Nadella.

There likely won’t be too much to excite consumers, as the event is aimed squarely at developers, but as usual there will be some interesting news coming out of the event in Seattle, including more information about the next version of Microsoft Edge.

Continue reading

Physical threats rank alongside cybersecurity for many US businesses

Threat

A new study into the threats faced by US businesses produced by Securitas Security Services reveals that in many sectors businesses are concerned as much or more with physical threats such as shootings than they are with cyber security.

It also shows rising concern about the threats posed to organizations by insiders, of the 27 threat categories security executives consider to be a concern, 21 may be caused or carried out by an insider.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.