ProtoArc launches XKM01 CaseUp portable work kit for remote professionals

ProtoArc has launched its latest productivity kit, the XKM01 CaseUp, aimed at business travelers and remote workers looking for a portable, ergonomic workspace. Building on the success of the previous XKM01 model, the XKM01 CaseUp includes a compact Bluetooth keyboard, a slim wireless mouse, and a foldable laptop stand -- all contained in a travel-friendly case.

With the XKM01 CaseUp, ProtoArc addresses the growing needs of remote workers, providing an ergonomic setup that supports improved posture and helps reduce neck strain. The keyboard, featuring a tri-fold design, folds down to just 8.46 x 4.68 x 0.78 inches, yet offers a full-size typing experience with 105 keys, including a numeric keypad and a row of shortcuts. Scissor-switch keys are intended to provide a quiet and responsive feel, and the dual-mode wireless connectivity (via 2.4G and Bluetooth) enables easy switching across Windows, macOS, and Android devices.

Continue reading

iStorage diskAshur3: A solid choice for secure portable storage [Review]

While cloud storage offers convenience and accessibility, it may not always provide the level of security some users require, especially if you have private data that you can’t afford to have fall into the wrong hands. If security is paramount, you should definitely consider a PIN authenticated hardware encrypted portable USB drive like iStorage’s excellent diskAshur3.

Available with HDD and SDD storage in a choice of capacities, diskAshur3 is designed with portability in mind, Measuring just 130mm x 80mm x 20mm, its sleek and sturdy build makes it easy to carry, whether you're traveling for business or managing data on the go. The device is compatible with a wide range of operating systems, including Windows, macOS, Linux, Android, iPadOS and more. It comes with both USB Type-A and Type-C cables, so you can connect it to most devices. Additionally, a protective carry case is included to keep the drive safe during transport and you get a free one year license of Nero BackItUp and iStorage DriveSecurity.

Continue reading

New solution helps prevent account takeovers

Account takeover attacks have increased 24 percent in the second quarter of 2024 compared to the same period last year, according to AI-powered anti-fraud platform Sift.

Account takeovers accounted for losses of almost $13 billion in 2023. To combat the problem Sift’s latest quarterly product update feature an enhanced solution to protect businesses from ATO fraud throughout the entire consumer journey.

Continue reading

Software supply chain attacks and how to deal with them [Q&A]

Software supply chain attacks have increasingly made the headlines in recent years. They occur when attackers change the code in third-party software components in order to compromise the applications using them.

These attacks can be used to steal data, corrupt systems or move laterally through networks. We spoke to Ansh Patnaik, chief product officer at CyCognito, to learn more about this type of attack and how to combat it.

Continue reading

Google Calendar gets a dark mode option and a welcome interface refresh

Google Calendar on web in dark mode

Google has announced sweeping changes to the look and feel of the web-based version of Google Calendar.

The headline change is the introduction of a much-requested dark mode option, but there is much more. Google Calendar on the web is being given an interface refresh to bring it in line with Google Material Design 3 and there is a focus on accessibility.

Continue reading

iBUYPOWER offers Intel Core Ultra 200S series processors in custom gaming PCs

iBUYPOWER, a system integrator known for custom and pre-built gaming computers, has announced that Intel’s new Core Ultra 200S series processors are now available in its gaming PC lineup. Starting today, customers can configure their iBUYPOWER systems with these processors, which come with a three-year labor and two-year parts warranty.

The Intel Core Ultra processors are designed to improve gaming performance with AI-based features and advanced computing capabilities. iBUYPOWER customers can use these processors to optimize their setups, benefiting from AI-powered auto-framing, creative task acceleration, and enhanced data security with three built-in AI accelerators.

Continue reading

Kingston Fury Renegade DDR5 CUDIMMs to launch with Intel 800 series chipset compatibility

Kingston Technology has just announced the Kingston FURY Renegade DDR5 CUDIMMs, designed to take advantage of Intel’s upcoming 800-series chipset. This chipset, formerly known as Arrow Lake, is the first to use Clock Drivers on CUDIMMs. At a speed of 6400MT/s DDR5, JEDEC now requires a Client Clock Driver (CKD) on UDIMMs and SODIMMs, which improves signal integrity. To distinguish these advanced modules, JEDEC has labeled them as CUDIMMs and CSODIMMs.

Kristy Ernt, DRAM business manager at Kingston, highlighted the appeal of these new modules: “The introduction of overclockable DDR5 CUDIMM modules allows us to reach a broader range of professionals who demand top-tier performance and want to push the limits of their systems without compromising signal integrity.”

Continue reading

Save $35.99! Get 'The Data Science Workshop, Second Edition' for FREE

With so much data being generated, there is immense scope to extract meaningful information that’ll boost business productivity and profitability. By learning to convert raw data into game-changing insights, you’ll open new career paths and opportunities.

The Data Science Workshop begins by introducing different types of projects and showing you how to incorporate machine learning algorithms in them. You’ll learn to select a relevant metric and even assess the performance of your model. To tune the hyperparameters of an algorithm and improve its accuracy, you’ll get hands-on with approaches such as grid search and random search.

Continue reading

Tor Browser 14.0 amps up privacy, but drops support for older Windows and macOS systems -- are you still protected?

The Tor Project has announced the release of Tor Browser 14.0 for Windows (both 32-bit and 64-bit), Mac, Linux, and Android. The browser offers increased privacy to users by redirecting their internet traffic through the open Tor network.

Tor Browser 14.0 updates the browser’s underlying code to the latest Firefox ESR release -- 128 -- while also introducing new improvements that allow its fingerprinting protections to work with several new features introduced in Firefox’s latest ESR release.

Continue reading

Satechi introduces Qi2 Trio Wireless Charging Pad with foldable design

Satechi has launched the Qi2 Trio Wireless Charging Pad, a new accessory designed to charge multiple devices using the latest Qi2 technology. The charging pad can simultaneously provide 15W of power to a Qi2-enabled iPhone or smartphone, 5W to AirPods, and 5W to an Apple Watch, including fast charging for Apple Watch Series 7, 8, 9, Ultra, and Ultra 2.

An upgraded version of the Trio Wireless Charger With Magnetic Pad, the Qi2 Trio features a foldable design that can function as both a flat charging dock and a stand, supporting portrait and landscape orientations. It also works with iOS 17’s StandBy Mode and watchOS’s Nightstand Mode. The pad comes with a 45W US power adapter, UK and EU travel adapters, and a USB-C cable to keep things organized.

Continue reading

MIXX launches StreamQ C4 noise cancelling wireless headphones for $49.99

MIXX has introduced its StreamQ C4 noise cancelling wireless headphones to the US market. These headphones offer features such as active noise cancellation (ANC), transparent mode, quick charging, hands-free calling, and voice assistant compatibility.

The StreamQ C4 headphones provide up to 40 hours of battery life on a full charge. A quick 15-minute charge can deliver up to 8 hours of additional playtime. The active noise cancellation feature helps reduce external noise, while the transparent mode allows users to hear important sounds from their environment, such as traffic.

Continue reading

Google launches new AI risk assessment tool

Last year Google launched its Secure AI Framework (SAIF) to help people safely and responsibly deploy AI models.

Today it's adding to that with a new tool that can help others assess their security posture, apply these best practices, and put SAIF principles into action.

Continue reading

AI expected to be the most important tech in 2025

A new study by the IEEE -- the world's largest technical professional organization -- focuses on on what are likely to be the most important technologies in 2025 along with future technology trends, including expectations for AI's market growth, benefits, uses, and skill sets.

The study surveyed over 350 CIOs, CTOs, IT directors, and other technology leaders in Brazil, China, India, the UK and US at organizations with more than 1,000 employees, it finds that 58 percent believe AI will be the most important tech next year, while 26 percent say cloud computing and 24 percent robotics.

Continue reading

Free dark web reports reveal organizations'exposed information

Robot hacker

Most cyberattacks are carried out using compromised credentials, but it can be hard for businesses to know if their information has been leaked.

In order to make it easier to discover leaked data, Quadrant Information Security is launching a free Dark Web Reports service offering insights into compromised credentials and leaked information and actionable advice on how to address them.

Continue reading

Apps, analytics and AI: 4 common mistakes

The app economy is big business. Apple’s App Store ecosystem alone generated a staggering $1.1 trillion in total billings and sales for developers in 2022. But as users demand more relevant and immediate experiences, often driven by AI, developers increasingly need competitive advantages to stand out. 

Real-time analytics, supercharged by generative AI, can provide a critical edge by allowing developers to extract key insights and quickly adapt their apps to reflect changing user expectations. But only 17 percent of enterprises today have the ability to perform real-time analysis on large volumes of data, and adoption remains slow. Meanwhile, even when companies are able to perform real-time analytics, there are several common mistakes that can prevent them from reaping its full benefits:

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.