Microsoft defends its JEDI cloud project bid


Google may have pulled out of the Pentagon's $10 billion JEDI cloud project, but Microsoft has no intention of following suit. Company president Brad Smith has used a blog post to defend the decision to bid for military contracts, despite pressure from its employees.
Smith recognizes that there are ethical concerns about getting involved in military projects, particularly when artificial intelligence technology is involved. However, he says: "we believe in the strong defense of the United States and we want the people who defend it to have access to the nation's best technology, including from Microsoft".
Linux-friendly company System76 shares more open source Thelio computer details


System76 has been making big news in the Linux community lately with its upcoming open source Thelio computer. Many Linux users have been clamoring for System76 to make its own hardware, and that dream will soon be a reality.
Unfortunately, not much is known about Thelio hardware other than it is definitely a desktop computer that is built with open source ideology. Today, however, System76 shares new details and images about the computer with those that signed up for its email list. Probably the most exciting is the promise of an open source "daughter board" that will apparently strip the proprietary aspects from a typical motherboard -- this has me seriously intrigued.
Best Windows 10 apps this week


Three-hundred-and-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Windows Store in the past seven days.
Microsoft is still working on getting the next feature update for Windows 10 ready for wider distribution. The company had to pull the upgrade days after initial release because of data loss issues.
The role of the mainframe in digital transformation [Q&A]


When many enterprises think of mainframes, they think of reliable, workhorse technology and legacy applications.
Mobile, windows-based applications are rarely top of mind. However, mainframes still power much of today's digital economy, from mobile banking to online ticket reservations, and still have a place in the enterprise IT stack.
Corsair launches K70 RGB MK.2 LOW PROFILE mechanical gaming keyboards


I'm a huge fan of mechanical keyboards. While they are great for gaming, I find they are quite brilliant for general use too. Nothing makes me happier than typing away on a quality keyboard, and mechanical keyswitches often feel very premium.
My one complaint about mechanical keyboards is the height. It can be hard to get my arms/shoulders comfortable when the keyboard ands its keys are too high/thick -- a problem I don't have with Apple's non-mechanical -- yet very slim -- desktop keyboard. Today, Corsair announces two new keyboards that aim to help with this issue. You see, as the name implies, the new K70 RGB MK.2 LOW PROFILE mechanical gaming keyboards have -- you guessed it -- low profile switches and RGB lighting!
Western Digital unveils 15TB Ultrastar DC HC620 SMR HDD for data centers


For home computer users, it is crazy not to use a solid state drive -- especially when coupled with a good cloud backup plan. With that said, data centers are an entirely different beast. When you are looking to maximize storage on a budget -- and with physical constraints -- a hard disk drive still reigns supreme. That's why its so important for companies to continue to innovate when it comes to mechanical hard drives.
For example, last year, Western Digital released an impressive 14TB SMR HDD for data centers, and today, the company kicks it up a notch. The 3.5-inch Ultrastar DC HC620, as it is called, gets a slight 1TB bump. In other words, this new data center drive features a very spacious 15TB of storage. And yes, as the SMR in the name implies, the drive uses the innovative shingled magnetic recording.
Majority of CISOs believe security breaches are inevitable


According to research from Kaspersky Lab, 86 percent of CISOs believe that breaches are inevitable, but too many are stuck in a vicious circle of risk.
Financially motivated criminal gangs (40 percent) and malicious insider attacks (29 percent) are the biggest risks to their businesses, and these are the threats that are extremely difficult to prevent, either because they are launched by 'professional' cybercriminals or because they are assisted by employees who are expected to be on the right side.
Identity and access management a major concern for cloud deployments


According to a new report, 71.5 percent of violations on AWS occur around identity and access management (IAM).
The study from cloud security company Netskope analyzed the Center for Internet Security's Benchmarks for AWS. Many of the IAM violations found involve instance rules, role-based access controls, and access to resources or password policy requirements -- things that enterprises can easily address even without an external security solution.
Ring unveils its 'next generation neighbor experience'


You've no doubt heard of Ring -- there’s near constant ads for it on TV these days, some featuring Shaquille O’Neal.
Ring became famous for its video doorbell that shows you who is outside, without you needing to open the door. The company has since expanded into video security cameras and full security systems, complete with camera, doorbell, sensors and all. Coverage runs you $10 per month, much cheaper than the big names that tend towards $30.
Interest in Kodi declines following introduction of anti-piracy measures


The Kodi Media Center has developed something of a reputation as a platform for pirated content. Although the Kodi Foundation has tried to distance itself from this, it seems other measures are having an effect.
The anti-piracy coalition, Alliance for Creativity and Entertainment (ACE), along with new anti-piracy rules in the EU and UK, plus bans on Kodi boxes being sold via online marketplaces, has seen interest in Kodi decline sharply.
UK hits Facebook with maximum possible fine for Cambridge Analytica privacy scandal


The UK Information Commissioner's Office (ICO) has penalized Facebook for the Cambridge Analytica data scandal by fining it the maximum amount permissible under law.
But the fine is unlikely to make Facebook break a sweat. At just £500,000 ($645,000) the sum represents a miniscule percentage of the social network's income. There will undoubtedly be arguments that this is little more than a rap on the knuckles for failing to protect the private data of at least a million Facebook users in the UK.
Microsoft releases Windows 10 19H1 Build 18267 with expanded search indexing


Microsoft is still busy fixing the many problems that have blighted the Windows 10 October 2018 Update, but that hasn’t stopped development on the follow up, due out next spring.
Build 18267 for Insiders on the Fast ring, introduces -- among other things -- the ability for the OS to index all of your folders and drives, to make finding files on your PC much easier.
Leaked documents show Google now requires OEMs to provide 2 years of Android security updates


One of the problems with buying an Android phone over an iPhone is the fact that you don't know how long you can expect to receive updates. There has long been criticism of the fact that many Android handsets are quickly abandoned while Apple pushes out iOS updates for a number of years.
We've heard suggestions that Google might start requiring handset manufacturers to provide updates for a minimum period, and now it seems that this has indeed been mandated. A leaked copy of a contract between Google and OEMs shows that there is now a requirement to release security updates -- or face the consequences.
Why endpoint management is critical to your enterprise security strategy


Endpoints make the enterprise run, whether they are laptops or desktops running macOS, Windows or Linux; smartphones or tablets running iOS or Android; virtual machines or IoT devices. They’re found driving business on local networks, in remote offices and in the hands of traveling users.
However, endpoints also make the enterprise vulnerable. They are a favorite target of criminals who launch cyberattacks via ransomware, spyware, phishing and other malicious software. Over the past year alone, critical endpoint vulnerabilities have been discovered in popular OSs and applications and then exploited by WannaCry, Meltdown, Spectre, Petya, Fireball, Bad Rabbit and other harmful code. The challenge facing enterprises, then, is how to minimize the vulnerability of their endpoints and simultaneously maximize their value. While endpoint management is already a widely adopted IT practice, now is the time for IT teams to expand their efforts to include endpoint security. As we’ll see below, combining endpoint management and security can solve some of your most pressing issues.
How automation will impact education


There has been a lot of hype around how new technologies like automation will impact our way of life. Some live in fear that their jobs will be lost to humanoid robots, while others excitedly welcome bots like Amazon Alexa into their home. The impact of 'robots' -- itself an ill-defined category -- is widely discussed and hotly contested.
In the business world, most industries have much to gain from automation and robotics, but what this looks like in practice is a far cry from the wider speculation.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.