UK tech execs want more government oversight of AI


Research from IT consultancy Zartis shows 72 percent of UK tech executives want more AI regulation, and almost a third (29 percent) want 'a lot more'.
The study, carried out by Censuswide, surveyed 100 senior technology executives in the UK and finds around 80 percent claim global government coordination of AI regulation is important to their company and 41 percent say it’s very important.
NVIDIA overtakes Apple as AI boom propels company value over $3 trillion


With its market value rocketing to $3.1 trillion, NVIDIA has become the second most valuable company in the world. A five percent rise in share prices pushed the chipmaker ahead of Apple, and now there is only Microsoft which is worth more than NVIDIA.
The soaring value of the firm is due in no small part to its heavy involvement and investment in AI. Having started life in the 1990s as a minor player in the graphic chip market, NVIDIA has ridden the artificial intelligence tidal wave.
Google could delete your Google Maps Timeline data in the name of privacy, so take action now


For nostalgia heads, the Timeline feature of Google Maps is an enjoyable way to peek into the past. Previously known as Location History, Timeline works much like Facebook Memories, helping jog your memory about trips you've taken and places you've visited.
But there are big changes afoot. Google is moving away from storing location data in the cloud to storing it on mobile devices instead. While this is a privacy-boosting move, Google says that the change means that users could find their Timeline data is deleted unless they take action.
Automation is critical to effective security for smaller businesses


Automation is a critical capability for a proactive security strategy says a new report from automated endpoint and vulnerability management company Syxsense and Omdia, a global analyst.
The research surveyed over 400 respondents including decision makers from North America and Europe, Middle East, and Africa (EMEA), at small and midsize business (SMB)+ sized companies across a variety of industries.
Kali Linux 2024.2 unleashed: Embracing the t64 transition and welcoming new tools


Kali Linux's latest release, version 2024.2, incorporates crucial updates and new community-contributed packages. Despite a slight delay due to extensive under-the-hood enhancements, the Kali team is excited to announce that version 2024.2 is now available for download or upgrade.
Key Updates in Kali Linux 2024.21. The t64 Transition: Securing Future Compatibility
The 2024.2 release introduces the t64 transition, an essential shift to 64-bit time_t types on supported 32-bit ARM architectures, safeguarding against the Year 2038 problem. This change ensures that Kali Linux remains a robust platform for future technologies and challenges.
Google acquires Cameyo


Google has announced its acquisition of Cameyo, a company known for its virtual application delivery (VAD) technology. This move is part of a broader strategy by the search giant to enhance ChromeOS by making it easier to manage and access legacy applications through the cloud, moving away from traditional desktop-based environments.
A Forrester Consulting study, commissioned by Google, indicates a shift towards web-based computing, with 90 percent of IT leaders envisioning future applications primarily residing in the cloud. Despite this trend, the study reveals that 50 percent of applications are still client-based, highlighting a gap that VAD technology aims to bridge.
Get 'Machine Learning Techniques and Analytics for Cloud Security' (worth $194) for FREE


Machine Learning Techniques and Analytics for Cloud Security covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions.
The aim of this book is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment.
80 percent of organizations not ready for CISA rules on security practices


The US Cybersecurity and Infrastructure Agency's (CISA) Secure Software Development Attestation Form rules come into force on June 11, 2024.
This requires software producers who work with the US government to adhere to and confirm the deployment of key security practices. But new research from Lineaje reveals that 80 percent of companies are not ready.
Lexar launches ARMOR 700 portable SSD


Lexar has unveiled its latest addition to the portable storage scene, the ARMOR 700 Portable SSD. This device caters to the needs of professional photographers, videographers, content creators, and gamers, providing a significant boost in speed and resilience.
The ARMOR 700 is engineered for extreme conditions, boasting an IP66 rating for dust and water resistance and a rugged design capable of enduring drops up to 3 meters. It offers top speeds of 2000MB/s for both reading and writing, ensuring that performance remains high even under stress.
Shokz expands open-ear true wireless earbud line with OpenFit Air


Shokz has announced the expansion of its open-ear true wireless earbud line with the launch of OpenFit Air. These earbuds feature Shokz's signature open-ear design, an adaptable ear hook for improved comfort, and crystal-clear audio.
Vincent Xiong, Chief Executive Officer at Shokz, said, "The evolution of our headphones has led us directly to OpenFit Air, open-ear earbuds that are ideal for working out, commuting, working or studying, and leisure. The team is proud of the excellent engineering to design a secure yet ergonomic earbud with natural audio. The lightweight design and case make OpenFit Air the perfect everyday earbud."
More testing needed to ensure security of web applications


A new report from CyCognito looks at the challenges faced by cybersecurity professionals in protecting web applications, which have become prime targets for cyberattacks.
Organizations maintain dozens, often hundreds, of custom web apps, developed in-house and by third-party partners. What's more over 60 percent update web applications weekly or more often.
Dexcom G7 continuous glucose monitoring system now connects directly to Apple Watch


DexCom has announced that its Dexcom G7 Continuous Glucose Monitoring (CGM) System now connects directly to Apple Watch in the United States. The Dexcom G7 is the first and only CGM system offering real-time glucose readings on the Apple Watch, providing users with freedom and convenience even when their iPhone isn’t with them.
Jake Leach, executive vice president and chief operating officer at Dexcom, stated, “At Dexcom, our users are at the heart of everything we do. Direct to Apple Watch has been one of our most requested features, and we’re thrilled to roll it out to Dexcom G7 users in the U.S. and around the world. We’ve long believed that people with diabetes should be able to view their CGM data where and how they choose. Direct to Apple Watch is a testament to that, allowing people with diabetes flexibility and choice in how they manage their health.”
Generative AI: Productivity dream or security nightmare?


The field of AI has been around for decades, but its current surge is rewriting the rules at an accelerated rate. Fueled by increased computational power and data availability, this AI boom brings with it opportunities and challenges.
AI tools fuel innovation and growth by enabling businesses to analyze data, improve customer experiences, automate processes, and innovate products -- at speed. Yet, as AI becomes more commonplace, concerns about misinformation and misuse arise. With businesses relying more on AI, the risk of unintentional data leaks by employees also goes up. For many though, the benefits outweigh any risks. So, how can companies empower employees to harness the power of AI without risking data security?
Biometrics explained: Breaking down the technology's controversy and contributions to security


Advancements in technology within the last decade have sparked the increased use of digital biometric verification. The technology’s modern verification capabilities have outpaced traditional cybersecurity attack methods geared toward credentials theft -- making the technology an attractive enhancement for corporations seeking to provide a more secure, seamless experience for users to verify their identities. Now, users can leverage biometric technology for secure access to critical information, such as applications in financial and healthcare sectors.
However, recent pushback from the Federal Trade Commission (FTC) on the use of biometrics for identity verification, particularly age verification, highlights compliance concerns surrounding enterprises’ data collection and storage practices -- especially the collection of minors’ biometric information.
The critical role of load balancing [Q&A]


When the internet first emerged, the need for load balancers was mainly to optimize the growing use of PC servers and to support the surge in Web traffic. Their basic functionality was designed to pool server resources to meet this demand.
Load balancers have come a long way since, becoming broadly accepted as essential for evolving IT infrastructure and the exponential growth of apps.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.