Lenovo ThinkStation P8 workstation is an AMD Threadripper PRO 7000 WX-Series powerhouse


Exciting news, y’all -- Lenovo has unveiled its latest high-performance AMD Threadripper PRO workstation, the ThinkStation P8. This new offering is a significant upgrade over its predecessor, the P620. The ThinkStation P8 is specifically designed to cater to professionals across various industries who require exceptional computing power, reliability, and flexibility in their workstations.
At the heart of the ThinkStation P8 lies the AMD Ryzen Threadripper PRO 7000 WX-Series processors, which are built on the advanced 5nm "Zen 4" architecture. These processors boast up to 96 cores and 192 threads, offering unparalleled performance for intensive tasks like building information modeling, software development, and product lifecycle management.
Organizations flock to generative AI despite security concerns


A new survey of over 900 global IT decision makers shows that although 89 percent of organizations consider GenAI tools like ChatGPT to be a potential security risk, 95 percent are already using them in some form within their businesses.
The research for Zscaler, carried out by Sapio Research, also reveals 23 percent of those using GenAI aren't monitoring the usage at all, and 33 percent have yet to implement any additional GenAI-related security measures -- though many have it on their roadmap.
Get 'The AI Product Manager's Handbook' (worth $35.99) for FREE


The AI Product Manager's Handbook is for people that aspire to be AI product managers, AI technologists, and entrepreneurs, or for people that are casually interested in the considerations of bringing AI products to life.
It should serve you if you’re already working in product management and you have a curiosity about building AI products.
AlmaLinux 9.3 is a new milestone in open-source enterprise Linux


The AlmaLinux OS Foundation, a key player in the open-source enterprise Linux arena, has today announced a significant milestone with the release of AlmaLinux 9.3. This latest version marks a notable shift in the development process of the CentOS alternative, being the first release constructed entirely from upstream sources, independent of Red Hat Enterprise Linux (RHEL) source code.
This strategic move aligns with the Foundation’s vision for AlmaLinux, aiming to provide a stable and predictable platform for enterprise Linux users, without compromising on compatibility. Jonathan Wright, CTO at Knownhost, LLC, adds a personal touch, “This release includes code that I committed upstream to CentOS Stream, which makes it even more special to me,” highlighting the collaborative spirit at the core of AlmaLinux’s development.
TP-Link launches affordable Tapo C120 2K QHD home security camera


In a world where security is becoming a paramount concern, consumers are constantly on the lookout for cost-effective solutions to protect their homes. Stepping up to the plate is Tapo, a brand under the well-regarded TP-Link umbrella, that’s making waves in the smart home products arena. Today, it introduces the Indoor/Outdoor Home Security Camera dubbed Tapo C120, a device that promises not to burn a hole in your pocket.
The highlight of Tapo C120 is its 2K QHD video clarity, a significant notch above the conventional FullHD 1080p resolution. This ensures users can view images and videos with an astonishing level of detail, making it easier to identify faces or other crucial details, an aspect that’s indispensable in a security apparatus.
The blurring lines between data protection and security [Q&A]


The threat landscape has evolved a lot over the past few years as cybercriminals become more and more sophisticated. This has forced change within the industry and blurred the lines between the previous separate data protection and security strategies.
We spoke to Jason Gerrard, senior director of international systems engineering at Commvault, to find out more about why this is happening and what it means for the future of the data protection and cybersecurity industries.
Navigating the complex role of the CISO under SEC disclosure rules


I’ve led security functions and established cybersecurity board reporting processes for over 25 years. The relationship between CEOs and CISOs has always held contradictions and the decisions around when to disclose a breach have always been hard. But the recent developments involving the SEC and SolarWinds is a regulatory game-changer for the CISO community. Still, I think we’ll all ultimately come out OK from this if we behave ethically.
New ethical lines are being drawn very quickly and publicly as teams figure out the lines between good judgment and fraud. I have no intention of moralizing here about the SEC’s allegations against SolarWinds and their CISO. Rather, I’d like to shine a light on the underlying principles of disclosure that have served as my own ethical compass, and which I think remain unchanged.
Fedora Slimbook 14 Linux laptop now available


About a month ago, Fedora announced their collaboration with Slimbook, launching the Fedora Slimbook 16 laptop. This partnership marked a significant step towards bringing Fedora Linux preinstalled on more devices. The response from the Linux community was overwhelmingly positive. Building on this success, the two parties are expanding their partnership.
Recognizing the demand for a more compact option, Fedora and Slimbook are now introducing the Fedora Slimbook 14 (available here now). This new model addresses feedback from users who found the 16-inch model a bit too large or had reservations about the Nvidia card. The 14-inch model maintains the distinct Fedora branding, ensuring that your love for Fedora is prominently displayed.
Evolving change management to software value realization


Most digital transformations fail. As a global entrepreneur and former software implementation consultant for Fortune 500 companies, I know that a digital initiative doesn’t end after a platform goes live. Digital change has a huge impact on our employees, who interact with about 13 applications 30 times per day to be successful in their jobs.
When trying to get employees to embrace new technology and tools, leaders say their biggest challenge is hard-to-use applications with a high learning curve (68 percent). It is, therefore, not surprising that many employees’ responses to digital transformation follow a process similar to the Kubler-Ross Stages of Grief. In the context of software adoption, we can think of this in terms of the associated Kubler-Ross Change Curve.
GenAI and its hallucinations: A guide for developers and security teams


With the rapid proliferation of Generative AI (GenAI), developers are increasingly integrating tools like ChatGPT, Copilot, Bard, and Claude into their workflows. According to OpenAI, over 80 percent of Fortune 500 companies are already using GenAI tools to some extent, whilst a separate report shows that 83 percent of developers are using AI-tools to speed up coding.
However, this enthusiasm for GenAI needs to be balanced with a note of caution as it also brings a wave of security challenges that are easily overlooked. For many organizations, the rapid adoption of these tools has outpaced the enterprise's understanding of their inherent security vulnerabilities. This would yield a set of blocking policies for example, Italy had at one point this year completely blocked usage of GPT, which is never the answer.
This misalignment could not only compromise an organization’s data integrity but also impact its overall cyber resilience. So, how should AppSec teams, developers, and business leaders respond to the security challenges that accompany the widespread use of GenAI?
TUXEDO Pulse 14 is an ultraportable Linux workstation powered by AMD Ryzen 7 7840HS


In a market where the word "ultraportable" often means compromising on power, the Pulse 14 emerges as a welcome paradox. This latest offering from TUXEDO is not just another addition to the mobile workstation pantheon; it redefines efficiency and performance in a form factor that challenges the status quo.
True to TUXEDO's roots, the Pulse 14 is a Linux-lover's dream, shipping with full support, pre-installed drivers, and custom-developed software packages. And for those who walk the line between Linux and Windows, the Pulse 14 offers the flexibility of Windows 11 as well.
Microsoft gives admins an extra three years of Extended Security Updates for Windows Server 2012


There is some good news for anyone who wants or needs to stick with Windows Server 2012 for a little longer.
Just a month after Windows Server 2012, Windows Server 2012 R2, and Windows Embedded Server 2012 R2 reached end of support, Microsoft has announced that administrators are able to get three additional years of Extended Security Updates (ESUs).
eufy launches Video Smart Lock E330 with 2K camera and fingerprint access


eufy, a subsidiary of Anker, has recently expanded its home security offerings with the launch of the Video Smart Lock E330. This new product combines several features: a 2K resolution camera, fingerprint access, and a video doorbell, all integrated into a single device.
A notable aspect of the E330 is its 8GB of local storage capacity, which comes without the need for additional subscription fees. This feature could appeal to users looking for a one-time purchase without ongoing costs.
Get 'Cloud Security Automation' (worth $39.99) for FREE


For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms.
Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.
To fix BI, build it into your applications


Business intelligence (BI) was once heralded as a technology that would democratize data, enabling everyone to become more productive and make better decisions. Today, though, analysts in the BI space like to share the same (and possibly apocryphal) statistic: The global business intelligence adoption rate is only 26 percent.
If only 26 percent of potential users ever access BI, something is broken. Why is access so poor? What can developers and engineers do to make BI achieve its full potential?
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.