Latest Technology News

14th Gen Intel Core processors usher in a new era of desktop performance

Earlier today, Intel unveiled its 14th Generation Core desktop processor family, highlighted by the extraordinary i9-14900K. The launch paraded six new unlocked desktop processors, showcasing up to 24 cores, 32 threads, and an unyielding 6GHz frequency straight from the packaging.

Not to be overshadowed, the Intel Core i7-14700K emerges with 20 cores and 28 threads, credited to four additional Efficient-cores (E-cores) over its predecessors. Furthermore, Intel’s Extreme Tuning Utility (XTU) now encapsulates the new AI Assist feature, simplifying overclocking to a one-click endeavor for select unlocked Intel Core 14th Gen desktop processors.

Continue reading

Unlock superior machine learning performance on Ubuntu Linux with AMD ROCm 5.7 and RDNA 3

The landscape of Machine Learning (ML) is constantly evolving, and the tools that power this tech revolution are accelerating at an equal pace. AMD has recently unveiled its ROCm 5.7 platform on Ubuntu Linux, marking a significant stride towards empowering ML practitioners with robust resources.

This latest update is designed to harness the parallel computing prowess of the newly introduced Radeon RX 7900 XTX and Radeon PRO W7900 graphics cards, both of which are built on the advanced AMD RDNA 3 GPU architecture.

Continue reading

Debian-based MX Linux 23.1 now available for download

Do you hate Mondays? Yeah, me too. Thankfully, we have some exciting Linux news on this particular Monday. You see, MX-23.1, the latest update to the MX-23 series, has been released today!

This update to the operating system brings a bunch of fixes, new features, and application updates, making the experience smoother for its users. If you already have MX-23, the good news is you don't need to reinstall anything. The new packages are available through the usual update channels, making the upgrade process a breeze.

Continue reading

Most enterprises expect systems to be attacked but there's confusion around responsibilities

A new survey of over 500 security and IT operations leaders worldwide shows that 61 percent believe that data loss within the next 12 months due to increasingly sophisticated attacks is ‘likely’ or ‘very likely’.

The study from Commvault, with research carried out by IDC, reveals that in many cases, senior executives/line-of-business leaders are minimally engaged in their company's cyber preparedness initiatives -- just 33 percent of CEOs or managing directors and 21 percent of other senior leaders are heavily involved.

Continue reading

Nine out of 10 British businesses want to invest in new technologies

A new study shows nine in 10 British businesses plan to invest in new technology including adaptive AI, sustainable tech, neurotech, applied observability and digital immune systems, in the next 12 months.

The report from software and services company Advanced shows that 70 percent of businesses are either already using or researching ways to bring adaptive AI into their working practices, even though almost 50 percent of business owners are concerned about the risks of doing so.

Continue reading

Apple will soon be able to update iOS on new iPhones in sealed boxes

iPhone 15 handsets

It can be frustrating to buy a new phone only to discover that there is an OS update to install before you can start using it. For iPhone users this could soon be a thing of the past thanks to an innovative new system developed by Apple.

The recently released iPhone 15 suffered with an overheating issue that was later fixed with a software update, putting the onus on owners of new devices to download and install the patch. But a new "proprietary pad-like device" will allow Apple Stores to install the latest software on handsets without the need to open the box.

Continue reading

Search traffic trends in the crypto sector: Unveiling the digital gold rush

Search traffic trends offer a fascinating glimpse into the evolving interests and behaviors of investors and enthusiasts. From its early days, the crypto sector has witnessed seismic shifts that continue to shape its landscape. For instance, some investors diversify their portfolios by adding L1 Blue Chip Assets from various sectors.

As cryptocurrencies emerged from obscurity, Bitcoin led the charge, captivating the imagination of investors. But what do the search traffic trends reveal about this digital darling and its competitors?

Continue reading

How IT can cut its power bills and help save the planet [Q&A]

It's estimated that enterprise IT accounts for around 1.5 percent of the world's energy usage, making it a major contributor to greenhouse gas emissions.

But a simple switch to using more efficient solutions rather than simply throwing everything into the cloud could make a significant difference. We spoke to Dr. Jim Webber, chief scientist at native graph database leader Neo4j and visiting professor at Newcastle University, to find out more.

Continue reading

Logitech Zone Wireless 2 elevates business headsets with AI for crystal-clear audio

In a world where remote work and hybrid work environments have become the norm, the demand for high-quality audio and communication tools has never been greater. Logitech, a company known for its innovative technology solutions, has once again raised the bar with the introduction of the Zone Wireless 2 business headset. This top-of-the-line headset combines cutting-edge AI technology with advanced features to provide an unparalleled two-way noise-free calling experience for business professionals.

The transition to hybrid work environments has presented unique challenges, with individuals working from various locations, including home offices, cafes, and shared workspaces. The presence of background noise and poor sound quality can hinder collaboration and productivity in virtual meetings and calls. According to a recent study, a staggering 85 percent of work-from-home users face audio issues, such as background noise from other participants and subpar sound quality through computer speakers. Logitech recognized this challenge and has tried to address it head-on with the Zone Wireless 2.

Continue reading

Say no to Microsoft Windows 11 -- make Slackel Linux 7.7 'Openbox' your next OS

With the release of Slackel 7.7 "Openbox," stepping into the Linux world from Windows 11 has become a lot simpler. This new version is packed with features that will surely catch the eye of those used to Microsoft’s operating system. In fact, this Linux distribution should make you forget about the upcoming Windows 12 too!

At the core of Slackel 7.7 is the Linux Kernel 6.1.57, with the latest updates from the well-regarded Slackware "Current" tree. This solid foundation promises a stable and secure setting for all your computer tasks. Available in both 64-bit and 32-bit versions, it caters to both modern and older hardware setups alike.

Continue reading

How hybrid working is turning the physical workplace into a target

Facing an onslaught of cyber-attacks originating from social engineering is now par for the course for many security professionals. However, a growing but often overlooked issue is how this technique is being manipulated to help gain entry to physical offices and workplaces to perpetrate cybercrime.

Very similar to social engineering in the digital world, cybercriminals are relying on human vulnerabilities to trick individuals into allowing them entry to premises.  Referred to as physical social engineering (PSE), this form of deception exploits typical behaviors and emotions with the goal of obtaining security credentials to give attackers access to confidential data and sensitive information held on computer systems.

Continue reading

Rectify11 3.0 arrives to fix Windows 11 -- download it now

Rectify11 on laptop

Although Microsoft is actively updating Windows 11, fixing problems and adding new features to its latest operating system -- most notably with the introduction of AI in the form of Copilot -- there are still lots of problems evident in the OS.

These issues and design inconsistencies ruin Windows 11 for many users, but thankfully Rectify11 is here to solve those, and the software has just been updated to version 3.0.

Continue reading

Sabrent Thunderbolt 3 8TB NVMe SSD Docking Station gets 25 percent discount

Sabrent has announced the 8TB variant of its Thunderbolt 3 NVMe SSD Docking Station (DS-SKRT-D8TB) is now available at a jaw-dropping discount. This tech marvel is now priced at $748.79, down from its original price of $999.99 on Amazon. This 25 percent price drop should make it quite enticing to many.

The crowning feature of the Sabrent Thunderbolt 3 Docking Station is its built-in 8TB SSD, boasting speeds that soar up to 1500MB/s. This massive storage hub bids adieu to the hassle of juggling multiple external drives.

Continue reading

Security researchers can pocket financial rewards in the new Microsoft AI Bounty Program

Microsoft mirror building logo

Microsoft now has a bug bounty program that aims to find issues in artificial intelligence. Specifically, the Microsoft AI Bounty Program is focused on tracking down vulnerabilities in the company’s own AI-powered "Bing experience". This catch-all term covers a surprising number of products and services.

Interestingly, with this bounty program Microsoft is only offering rewards for the discovery of vulnerabilities considered Critical or Important. Those that are deemed of Moderate or Low severity will go unrewarded.

Continue reading

The top 5 tips for identifying and deterring suspicious API traffic

api

With the increasing reliance on APIs, detecting suspicious API traffic has become crucial to ensure the security and integrity of these interactions. Suspicious API traffic poses a huge threat to the overall system and its data, the traffic can indicate malicious intent such as unauthorized access attempts, data breaches, or even potential attacks targeting vulnerabilities in the API infrastructure.

API traffic refers to the data and requests that are transmitted between different applications or systems using APIs. This allows software programs to communicate and exchange information, enabling seamless integration and interaction between various platforms. API traffic also involves the transfer of data, such as requests for data retrieval or updates, between the client application and the server hosting the API. 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.