Latest Technology News

ZOTAC launches new MEK HERO gaming PCs with advanced NVIDIA GeForce RTX 40 SUPER Series graphics

In a significant addition to their gaming lineup, ZOTAC has officially launched three new models in the MEK HERO pre-built Gaming PC series: the A7647S, A7647STI, and A7748S.

These models are integrated with the cutting-edge ZOTAC GAMING GeForce RTX 4070 SUPER Twin Edge OC, 4070 Ti SUPER Trinity OC White Edition, and 4080 SUPER Trinity Black Edition Graphic Cards, respectively. Paired with the latest AMD Ryzen 5 7600 and Ryzen 7 7700X processors, these gaming PCs are engineered to deliver unparalleled 4K gaming performance, featuring AI-accelerated DLSS 3.5 and Real-Time Ray Tracing technology.

Continue reading

The rise of interactive digital media: transforming traditional publications

The days of paper being the main way to get information and entertainment are long gone. Now, the online world gives you so many options to take in media, from articles on websites to interactive e-books. This is changing more than what you read -- it's also changing how you connect with what you read. This shift means your experience is more active and hands-on, with the lines between you as the reader and the content getting blurrier.

With advanced tech, you have more control over tailoring your reading to suit you. Digital formats let you dig deeper into topics, with interactive parts that make the content come alive. Whether it's through moving graphics, videos dropped in, or hyperlinks, your involvement with publications is now more immersive than just reading words on a page passively.

Continue reading

Get 'Essential Linux Commands' (worth $39.99) for FREE

The role of a system administrator is ever-evolving, with the Linux command line at its core.

This makes Linux command-line mastery an essential skill to demonstrate your ability to efficiently manage and maintain systems efficiently. Essential Linux Commands addresses a diverse range of topics, including package management, file manipulation, networking strategies, system monitoring, and diagnostic tools.

Continue reading

Patriot Memory unveils Viper PV553 M.2 2280 PCIe Gen5 x4 SSD

Patriot Memory has unveiled its latest solid state drive: the Viper PV553. This M.2 2280 PCIe Gen5 x4 SSD not only promises blazing fast speeds, but it also introduces an innovative cooling solution that sets it apart from a lot of the competition.

The Viper PV553 marks Patriot Memory’s first foray into SSDs with a blower fan design, a revolutionary approach to active thermal management. This feature ensures that the SSD maintains optimal performance by effectively dissipating heat, even during the most intense gaming sessions. The slim 16.5mm aluminum heat shield, enhanced with premium materials and an embedded thermal sensor, guarantees consistent, high-level performance across the board.

Continue reading

Blancco partners with Lenovo to offer secure data erasure for enterprises

Sweep away data

Enterprises are dealing with ever greater volumes of data and that brings with it added risk as well as compliance issues and management costs.

In particular, it's important for security and compliance to be able to securely dispose of data that's no longer required. This is why data erasure specialist Blancco Technology Group is announcing a global collaboration with Lenovo to provide secure data erasure as part of the Lenovo ThinkShield security solution.

Continue reading

The way AI is enhancing online security

AI

In an era marked by the relentless expansion of digital connectivity, the assurance of robust online security stands as a critical imperative. Cyber threats, characterized by their growing sophistication and frequency, demand innovative solutions to safeguard sensitive data and preserve privacy.

Among these solutions, artificial intelligence emerges as a transformative force reshaping the landscape of online security. This article delves into the many ways in which AI is revolutionizing online security protocols, from proactive threat detection to dynamic risk assessment and adaptive response strategies.

Continue reading

Web app attacks target security misconfigurations

New research from Barracuda finds that 30 percent of all attacks against web applications target security misconfigurations -- such as coding and implementation errors.

Analysis of incidents detected and mitigated by Barracuda Application Security during December shows 21 percent involved code injection. Though these were more than just SQL injections, generally designed to steal, destroy, or manipulate data.

Continue reading

Improving visibility into end-user computing [Q&A]

endpoint data

In the wake of the coronavirus pandemic we've seen greater focus on workplace flexibility with many employees being in the office for fewer days each week.

But to make this work, enterprises must be able to track the state of their end-user computing to understand their access, performance and user satisfaction.

Continue reading

Mozilla Monitor Plus launches with new automatic data removal service

Mozilla Monitor, formerly known as Firefox Monitor, has introduced a subscription-based service named Mozilla Monitor Plus. This paid service aims to provide a comprehensive solution for individuals concerned about their online privacy, especially in the wake of increasing data breaches.

Mozilla Monitor has garnered a subscriber base of 23,000, indicating a significant interest in personal data security. The new service, Mozilla Monitor Plus, is a response to the concerns of 42 percent of young adults (aged 18-24), who have expressed a desire to understand and control the personal data that companies hold about them.

Continue reading

Winlator, the app that lets you play Windows PC games on your Android phone, gets a big update

Playing Android games on your PC is easy enough. You have the option of using third-party emulators such as Bluestacks or NoxPlayer, or you can take advantage of the built-in Windows Subsystem for Android, available on Windows 11.

However, if you wish to flip the script and play Windows games on your Android device, the process is somewhat more complex, but not impossible. To do this, you’ll need Winlator, which has just been updated to version 5, improving compatibility and performance, and resolving various issues.

Continue reading

Breaking Bitlocker: Watch Microsoft's Windows disk encryption being bypassed in just 43 seconds

Microsoft BitLocker is a full-disk encryption feature included in certain editions of Windows operating systems, designed to enhance the security of data stored on a computer or external drives. It serves as a crucial component of Microsoft's broader approach to data protection and aims to safeguard sensitive information against unauthorized access, particularly in scenarios where devices might be lost, stolen, or otherwise fall into the wrong hands.

BitLocker operates by encrypting the entire contents of a disk drive, including the operating system, system files, and user data. It uses a symmetric encryption algorithm, typically AES (Advanced Encryption Standard), to secure the data. To access the encrypted information, a user must provide a pre-boot authentication password or use additional authentication methods, such as a PIN or a USB key.

Continue reading

Safeguards for using Artificial Intelligence in election administration

Election administration is an essential component of the democratic process, but is also very challenging. The number of voters involved, which can climb into the tens of millions, requires the use of systems that have been fine-tuned for maximum efficiency. Managing the complexity of those systems, which are often spread out over vast geographical areas, is daunting, especially considering the task often relies on a volunteer staff with high turnover rates. Looming over the entire enterprise is the requirement for unquestionable accuracy and crystal-clear transparency.

Artificial intelligence, which thrives at optimizing systems for maximum efficiency and accuracy, has the potential to provide valuable support for election administration. Leveraging it for that purpose, however, also requires that strong safeguards be put in place.

Continue reading

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing -- which utilizes quantum mechanics to solve complex problems faster than conventional computers -- could potentially turn data security on its head.

IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality. In fact the global quantum computing market size in terms of revenue was estimated to be USD 866 Million in 2023 and is poised to reach USD 4,375 Million by 2028, growing at a CAGR of 38.3 percent from 2023 to 2028. This is raising concerns that these computers might pose a threat to current public-key cryptography algorithms and potentially expose sensitive data. As such, data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world.

Continue reading

X (Twitter) alternative BlueSky opens sign-ups for everyone

Bluesky butterfly logo

If you always wanted to sign-up for the X (Twitter) alternative BlueSky but never managed to get your hands on an invite code, you will be glad to hear that these codes are no longer required to create an account.

The social media service, which managed to grow to over 3 million users already, is now available for everyone. The number of users pales in comparison to the 130 million that Meta's Threads managed to accumulate, but it is more than Mastadon's 1.8 million.

Continue reading

Tech businesses turn to AI to improve revenues and compliance

Process efficiency and cost-saving are top priorities for life sciences and high-tech executives, with greater emphasis placed on advanced analytics and artificial intelligence (AI) to achieve these priorities according to a new report.

The study from Model N shows three-quarters of executives say their current approach to revenue optimization needs improvement, and survey responses show plans to bolster revenue operations by incorporating advanced analytics (68 percent), AI (59 percent), and robotic process automation (46 percent).

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.