Get 'Mastering Kubernetes -- Fourth Edition' (worth $43.99) for FREE
The fourth edition of the bestseller Mastering Kubernetes includes the most recent tools and code to enable you to learn the latest features of Kubernetes 1.25.
This book contains a thorough exploration of complex concepts and best practices to help you master the skills of designing and deploying large-scale distributed systems on Kubernetes clusters. You’ll learn how to run complex stateless and stateful microservices on Kubernetes, including advanced features such as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage backends.
Over half of enterprises struggle to get insights from their data
Research released this week from Hitachi Vantara shows 55 percent of enterprises are struggling to derive meaningful insights from their data.
The survey of over 200 IT leaders across North America and Europe, carried out by Forrester Consulting, reveals ongoing challenges related to security, inflexible systems, isolated data, a skilled labor shortage, and the need for infrastructure agility.
How to remove Copilot AI from Microsoft Edge web browser
You can’t have failed to have noticed that Microsoft has gone all-in on artificial intelligence lately. The company has created Copilot, an AI assistant, and added it to a number of its products, including Bing, Edge, and Windows 11.
While it’s a worthy addition that’s only going to get more useful over time, not everyone wants AI invading their software. We’ve already shown you how to remove Copilot from Windows 11, but how about removing it from Microsoft Edge?
Microsoft boosts Windows 11 security with encrypted DNS server discovery and SMB encryption for outbound connections
With the release of the latest Canary build of Windows 11, Microsoft has introduced welcome new security options. The first gives administrators the option of requiring encryption of all outbound SMB client connections.
The second is the arrival of support for Discovery of Network-designated Resolvers (DNR) which allows for the automatic discovery of encrypted DNA servers. Eliminating the need for manual configuration is an ease-of-use move that makes adoption more likely.
Apple TV+, Apple Arcade and Apple News+ all get massive price increases
Following the lead of Netflix, Apple is set to increase its subscription prices. Apple TV+, Apple Arcade and Apple News+ are all affected, with existing subscribers having 30 days before the price jump; new subscribers will have to pay the higher price immediately.
The increases are significant, with Apple TV+ subscriptions going up by a colossal 43 percent per month. Apple One also jumps in price across the three tiers -- Individual, Family and Premier. The new pricing will apply in the US as well as "select international markets".
TUXEDO launches 5th generation Polaris 15 and Stellaris 16 Linux gaming laptops
The world of PC gaming often seems like a relentless race for the highest specs, typically led by Intel's high-end processors such as the Core i9-13900HX, boasting extreme multicore performance. However, the reality is, not every gamer needs (or can afford) such power. Enter the new TUXEDO Polaris 15 and Stellaris 16, equipped with AMD Ryzen 7 7840HS and NVIDIA GeForce RTX graphics. These machines promise a balance of high performance, affordability, and power efficiency, making high-end gaming accessible to a wider audience.
At the core of these gaming laptops is the AMD Ryzen 7 7840HS processor. Despite appearing underpowered with “only” 8 cores and 16 threads compared to its Intel counterparts, this chip, made with a modern 4nm process, showcases energy efficiency. It delivers performance nearly parallel to the more power-hungry Intel Core i7-13700H, positioning it as a wise pick for upper mid-range gaming. The shift to the Zen 4 architecture yields about 13 percent and 17 percent better single-core and multicore performance respectively, compared to its predecessors.
The nastiest malware of 2023
OpenText Cybersecurity has released its sixth annual look at the threat landscape to reveal the most notorious malware trends.
This year four new ransomware gangs, believed to be a new generation of previous big players, top the list. Newcomer Cl0p takes the prize for this year's nastiest malware after commanding exorbitant ransom demands with its MOVEit campaign.
New service aims to make cloud more accessible
With so many different platforms and technologies available, navigating the world of cloud computing can be tricky.
In a bid to make things simpler Acorn Labs is announcing public beta availability of its cloud developer platform Acorn, a service that makes it simple for anyone to run software in their own cloud sandbox and easily share their creations.
Proton Pass launches a secure way to share passwords
We all know that you shouldn't share your passwords with anyone else. But the world is a complex place and there are occasions when it's necessary to send someone a login -- sharing access to a business social media account for example -- or other sensitive information.
Email, SMS, Post-it notes, etc are not secure ways to do this, so Proton is launching a new Secure Password Sharing feature for its Proton Pass password manager.
The state of supply chain data and how to fix it
Digital transformation is becoming integral to procurement success. In fact, 77 percent of companies have adopted peer-to-peer (P2P) and source-to-contract (S2C) systems. However, acknowledging the importance of digital transformation and taking full advantage of its benefits are two very different things.
Yes, procurement technologies can provide organizations with a competitive advantage and improve operational efficiency, but these benefits are only possible when there is a trusted supplier data foundation. Even as leaders look to digital technologies to accelerate their procurement processes, they run into a consistent and demoralizing roadblock: low-quality supplier data. Whether it’s inaccurate, piecemeal or missing, bad supplier data can lead to extensive time spent on manual outreach, a reliance on supplier portals and conflicting data sources -- ultimately hindering the progress of digital transformation.
How organizations can stay secure in the face of increasingly powerful AI attacks
It’s almost impossible to escape the hype around artificial intelligence (AI) and generative AI. The application of these tools is powerful. Text-based tools such as OpenAI’s ChatGPT and Google’s Bard can help people land jobs, significantly cut down the amount of time it takes to build apps and websites, and add much-needed context by analyzing large amounts of threat data. As with most transformative technologies, there are also risks to consider, especially when it comes to cybersecurity.
AI-powered tools have the potential to help organizations overcome the cybersecurity skills gap. This same technology that is helping companies transform their businesses is also a powerful weapon in the hands of cybercriminals. In a practice, that’s sometimes referred to as offensive AI, where cybercriminals use AI to automate scripts that exploit vulnerabilities in an organization’s security system or make social engineering attacks more convincing. There’s no doubt that it represents a growing threat to the cybersecurity landscape that security teams must prepare for.
Firefox 119 starts to roll out improved Firefox View feature, ramps up privacy and security
Mozilla has rolled out Firefox 119.0, the latest version of its open-source, Gecko-powered web browser for Windows, Mac, Linux and Android.
The new release offers two notable new features -- a major expansion of its Firefox View tab’s content, plus additional PDF editing tools along with a slew of security and privacy enhancements.
Get 'Engineering Intelligent Systems' (worth $108) for FREE
As artificial intelligence (AI) and machine learning technology continue to develop and find new applications, advances in this field have generally been focused on the development of isolated software data analysis systems or of control systems for robots and other devices. By applying model-based systems engineering to AI, however, engineers can design complex systems that rely on AI-based components, resulting in larger, more complex intelligent systems that successfully integrate humans and AI.
Engineering Intelligent Systems: Systems Engineering and Design with Artificial Intelligence, Visual Modeling, and Systems Thinking relies on Dr. Barclay R. Brown’s 25 years of experience in software and systems engineering to propose an integrated perspective to the challenges and opportunities in the use of artificial intelligence to create better technological and business systems.
Twitter alternative Pebble -- previously known as T2 -- announces shock closure
When Elon Musk took over at Twitter and set about implementing sweeping and controversial changes -- including renaming it to X -- there was a surge in rivals vying for attention. The likes of Mastodon and Bluesky dominated, and continue to do so, but there were also newcomers seeking to offer an alternative and a safe refuge for Twitter exiles.
One such option was T2, a social platform set up by two former Twitter employees. T2 recently rebranded to Pebble, but after initially enjoying a period of success the announcement has come that the service is closing down in a matter of days.
How AI can help secure the software supply chain [Q&A]
Securing the software supply chain presents many challenges. To make the process easier OX Security recently launched OX-GPT, a ChatGPT integration aimed specifically at improving software supply chain security.
We spoke to Neatsun Ziv, co-founder and CEO of OX Security, to discuss how AI can present developers with customized fix recommendations and cut and paste code fixes, allowing for quick remediation of critical security issues across the software supply chain.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.