Latest Technology News

What's in a name -- why you should care what open source is

"We really should stop getting hung up about what open source means," a statement repeatedly made by those for whom a lack of understanding of open source is advantageous. Generally those who don’t want to meet the standards that are set out in the Open Source Definition (OSD) which all Open Source Initiative approved license must meet, including the requirement that open source software must be usable by anyone for any purpose. And usually they are in denial of the requirement for open source licenses to be usable for any purpose, which includes commercialization. This really sits at the heart of open source.

In a commercial context open source means enabling your competitors with your own innovation. In a world where companies are driven by shareholder value this simply would not happen if it did not come with clear and measurable advantages, like collaboration, creating a defacto standard or building an ecosystem around it, and where equivalent or greater value than the proprietary royalty model is generated.

Continue reading

Freepik launches Pikaso, its free, real-time sketch-to-image AI tool

Freepik, known for its extensive platform of audio-visual resources, has launched Freepik Pikaso, a new real-time sketch-to-image generator. The tool is designed to make AI image creation more accessible and efficient.

Using new groundbreaking LCM AI technology, Freepik Pikaso allows users to create an image by sketching in real-time. Creations can be further enhanced with the addition of icons, additional sketches, written prompts, or even images from a webcam. Since its beta launch, the tool has been used to create over 10 million AI-generated images.

Continue reading

Get 'Linux All-In-One For Dummies, 7th Edition' (worth $24) for FREE

Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux.

This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you’ll have access to the most comprehensive overview of Linux around.

Continue reading

Almost 90 percent say they're prepared for password-based attacks -- but half still fall for them

A new report from Axiad shows that 88 percent of IT professionals feel their company is prepared to defend against a password-based cyberattack, yet 52 percent say their business has fallen victim to one within the last year.

Based on over 200 responses from US IT pros, the study shows 39 percent think phishing is the most feared cyberattack, while 49 percent say it's the attack most likely to happen.

Continue reading

IT leaders struggle to find AI talent but aren't investing in professional development

Training course

One-in-three IT leaders say they are struggling with finding qualified AI and ML talent, and while these are the biggest areas of focus, 43 percent rate their teams' AI and ML skill sets as low.

A new study from Skillsoft of more that 5,700 IT professionals finds skill development is a critical piece of the puzzle for building a competitive organization, though more work is needed to optimise training among technology teams.

Continue reading

'Composite AI' could be key to successful artificial intelligence in the enterprise

New research shows that businesses are increasing their investments in AI across many areas, but there are challenges and risks that they need to manage.

The study of 1,300 tech leaders from Dynatrace shows 98 percent are concerned that generative AI could be susceptible to unintentional bias, error, and misinformation. In addition 95 percent are concerned that using generative AI to create code could result in leakage and improper or illegal use of intellectual property.

Continue reading

Zyxel Networks launches WBE660S Wi-Fi 7 BE22000 Triple-Radio NebulaFlex Pro Access Point

Zyxel Networks has expanded its portfolio with the launch of the WBE660S Wi-Fi 7 BE22000 Triple-Radio NebulaFlex Pro Access Point, marking its entry into the Wi-Fi 7 market. This new product is specifically designed to cater to the needs of managed service providers (MSPs) and small- to medium-sized businesses (SMBs).

The WBE660S is an enterprise-grade access point that features a triple radio BE22000 architecture. It utilizes a broader 320MHz channel, which enables it to deliver speeds that are significantly faster -- up to five times -- compared to the Wi-Fi 6/6E solutions. This high-speed connectivity is particularly beneficial for applications that demand high bandwidth, such as video streaming, broadcasting, online gaming, and VR/AR, ensuring users experience seamless and latency-free connectivity.

Continue reading

JEDEC officially recognizes CAMM2 standard -- smaller RAM modules to cram more into less space

Old memory module

Laptops are soon going to benefit from a major memory boost thanks to the recognition of a new standard. CAMM2 is the successor to the familiar SO-DIMM form factor, and its significantly smaller size opens up potential for more memory to be installed into less space.

JEDEC, the organization that defines many computing and electronics standards, has published JESD318: Compression Attached Memory Module (CAMM2) Common Standard. CAMM2 is 57 percent thinner than SO-DIMMs and also has the potential for higher clock speeds. The memory has already been used by Dell as a proprietary memory type, but now it is likely to see wider adoption.

Continue reading

How organizations can get a handle on cloud security [Q&A]

Cloud data protection

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

Continue reading

Kodi 21 'Omega' hits a major development milestone -- download it now! [Updated]

Woman watching Kodi

Kodi 21 -- codenamed 'Omega' -- is the next version of the hugely popular home theater software. The Kodi Foundation released the first beta version of the program two months ago, introducing a number of new features, fixes, and cleanups.

Today, a brand new build arrives, which will be much more appealing to those users seeking greater stability from the software.

Continue reading

Ubuntu-based Linux Mint 21.3 'Virginia' Beta now available for download

The beta release of Linux Mint 21.3, code-named "Virginia," has been released today. You can choose from three desktop environments -- Cinnamon, Mate, and Xfce. Based on Ubuntu 22.04, the Linux Mint 21.3 beta should offer a stable and versatile platform suitable for a wide range of software and applications. Scheduled for support until 2027, this version combines updated software with refinements and new features to enhance the desktop experience.

The beta version addresses several crucial areas to enhance user experience. The Snap Store is disabled by default in this release, aligning with Linux Mint's approach to package management. Users seeking to re-enable it can find guidance in the Linux Mint user guide. For those using Virtualbox, the beta provides solutions for common visual issues like black or garbled screens, including adjustments in graphic controller settings.

Continue reading

Beyond phishing: The top employee security risks you're probably not measuring

While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.

Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.

Continue reading

Three methods to improve organizational data quality today

Data

Our modern business landscape transforms constantly, yet the value of data endures. However, thriving companies don’t merely amass data -- they cultivate meaningful data.

Leaders must have trustworthy data to unlock organizational insights, but inaccurate data is still rampant in most organizations. This data costs leaders far more than missed opportunities. According to industry research, bad data costs U.S. enterprises $3.1 trillion annually. Still need convincing about the benefits of data quality? Let’s discuss the benefits of high-quality data and explain how leaders can adopt a leading data management strategy today.

Continue reading

The coming AI economic revolution: Can artificial intelligence reverse the productivity slowdown?

AI

The artificial intelligence revolution is here to stay, and a large part of the reason is the massive economic impact of the technology on the industries it has touched. Effectively implementing AI into a business’s operation requires an incredible amount of planning and precision, as well as consideration of all of the ethical and regulatory challenges associated with the use of the technology.

One of the primary reasons AI has become such an exciting and dominant technology is its ability to process data faster than human workers. In many industries, we have seen efficiency increase by allowing AI and automation to take over simpler and more labor-intensive tasks, enabling human workers to spend more time on tasks that require a more human quality.

Continue reading

Balancing AI with insider risk management

web threats

AI has officially taken off, yet organizations are squarely divided on their use in the workplace.  Organizations that encourage the use of AI and Large Language Model (LLM) tools for productivity are willing to accept the security risk but often lack the policies, education, and controls required to mitigate potential security risks, including those posed by insiders.

On the other hand, companies that take a hard line against the tools by implementing strict rules against any installation or use of AI-LLMs may cause their employees to be less productive. Fortunately, there is a middle ground that balances productivity with security and, importantly, with insider risk management.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.