Latest Technology News

Whoopsie daisy! Microsoft accidentally released the Windows 11 KB5017383 update to WSUS

Microsoft building logo

When we write about updates for Windows, it tends to be for one of two reasons -- sharing news that a new update is available, or giving details of problems that have been found with the latest release. Now we have something a little different.

Microsoft has admitted that it made a mistake with the KB5017383 update for Windows 11, windows 10 and Windows Server a few days ago. It is, however, not necessary something that everyone would notice.

Continue reading

2022's most pressing cloud challenges

Despite the disruption and changes the pandemic unleashed on our world, technology continues to iterate through inevitable cycles of adaptation, innovation, and change. The worldwide shift to remote work, for example, placed a huge burden on IT infrastructure, ultimately quickening the pace of digital transformation. With this comes several challenges that IT leaders must navigate and balance.

According to the Foundry’s (formerly IDG Communications) 2022 Cloud Computing Survey, controlling cloud costs, data privacy and security, and securing expertise across in-house and supplier teams, are the three core challenges that will determine the success of cloud investments in the months and years to come. 

Continue reading

Understanding how all businesses can benefit from voice analytics

voice recognition

Voice and speech analytics refers to the process of analyzing recorded conversations such as phone calls to gain insights into customer behavior and call quality, often utilizing AI by employing a Natural Language Processing (NLP) engine that uses context and emotional clues to determine more accurately what is being said.

In utilizing voice analytics solutions, businesses are now able to spot keywords and phrases, as well as detect sentiment and emotional context using pitch, pacing, and language clues to observe whether a conversation is going in the right direction or if it’s going downhill. By evaluating the tone of a customer’s voice, businesses can assess whether their customers are satisfied, annoyed, or upset. 82 percent of customers now consider no longer engaging with a business if they feel they have had a poor customer experience, so understanding potential issues before they arise may be the single most valuable thing a business can do to retain customers.

Continue reading

How AI enables organizations to move from network monitoring to proactive observability

In today’s world, the volume of data and network bandwidth requirements are growing relentlessly. So much is happening in real-time as businesses adapt and advance to become more digital, which means the state of the network is constantly evolving. Meanwhile, users have high expectations around applications -- quick loading times, look and feel visually advanced, with feature-rich content, video streaming, and multimedia capabilities -- all of these devour network bandwidth.

With millions of users accessing applications and mobile apps from multiple devices, most companies today generate seemingly unmanageable volumes of data and traffic on their networks. 

Continue reading

Legacy technology undermines ransomware response

Ransomware

Almost half of respondents to a new survey say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. 46 percent are relying on primary backup and recovery infrastructure that was designed in, or before, 2010.

The study commissioned by Cohesity from Censuswide also finds 62 percent expressed some level of concern over whether their IT and security teams would be able to mobilize efficiently to respond to an attack.

Continue reading

10 best practices for file management and archiving

File transfers

File management is crucial for businesses and organizations to minimize confusion and maintain document control. It’s important to have a system with a strategy in place that allows you to archive and store your files.

File archiving helps you monitor and manage your documentation. It acts as a collection of data that gives you access to multiple computer files and their data, making it easier to manage your records. To store and retrieve your documents, you want to develop practices that ensure operational excellence, syncing your data and simplifying the way it is archived.

Continue reading

Best Windows apps this week

Five-hundred-and-nine in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released the first feature update for Windows 11 this week. The new version improves the usability of existing features, such as Snap Layouts or the Start Menu, and adds a number of new features to the system next to that.

Continue reading

Are we heading for a cyber war?

We've already seen that cyberattacks have played a role in the war in Ukraine. But what about the prospect of more widespread cyber warfare. Could Ukraine be just a testing ground?

Education advice site Security Degree Hub has produced an infographic looking at the prospects of a cyber war and what it might look like.

Continue reading

Microsoft releases KB5017389 update for Windows 11 2022 Update

Windows 11 logo on laptop screen

Taking Windows 11 up to build 22621.607, Microsoft has just released the KB5017389 update fixing a huge number of issues that have been uncovered.

For now, the update is only available to Windows Insiders signed up for the Release Preview Channel and running Windows 11 version 22H2. Microsoft has used the update to introduce a range of fixes including addressing Microsoft Store problems, issues with static IP addresses, and solving a problem affecting color modes in Task Manager.

Continue reading

Staying ahead of the hackers with zero trust [Q&A]

With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.

This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.

Continue reading

There are already problems with Windows 11 2022 Update for NVIDIA users

Windows 11 2022 Update

It is mere days since Microsoft started the rollout of Windows 11 2022 Update, but there are already reports of issues from people who have updated. Some owners of systems with NVIDIA GPUs are reporting a serious reduction in gaming performance after installing the update.

Reddit and Microsoft community forums are littered with complaints from gamers who have installed Windows 11 2022 Update and found that framerates in games have been slashed by over 87 percent in some cases. Major drops in CPU usage are also leading to stuttering game performance.

Continue reading

NETGEAR Nighthawk AXE3000 (A8000) is the world's first Wi-Fi 6E USB 3.0 adapter

Wi-Fi 6E is the latest and greatest wireless networking standard. It is most notable for using the 6GHz band, making it superior to "regular" Wi-Fi 6. To take advantage of this new standard, you will obviously need a Wi-Fi 6E router. However, that is just part of the equation. If you do not have devices with Wi-Fi 6E as well, it is kind of pointless.

Thankfully, many new computers are coming with Wi-Fi 6E, but what if you are not ready for a new PC? Well, in that case, you can crack open your desktop or laptop and install a card -- if you have an available slot, that is. Of course, not everyone is comfortable opening up their computer -- it can be a scary affair.

Continue reading

Satechi launches USB-4 Multiport Adapter with 2.5G Ethernet for Windows and Mac

With so many USB-C multiport adapters on the market these days, I'll be honest, it can be hard to get excited about new models. I mean, look, the dongles all pretty much work the same way, right? The adapter turns a single USB-C port into several useful ports.

Today, however, Satechi has a new such product that got my attention. Called "USB-4 Multiport Adapter with 2.5G Ethernet," the exciting aspect is in the name -- you get multi-gig Ethernet. Sure, plenty of similar adapters provide gigabit Ethernet, but the 2.5G offering here is rather special.

Continue reading

The real identity crisis: Why businesses must act on machine identities

Recent years have seen endless stories of human identity being exploited heavily in attacks. The malicious actors behind these attacks have compromised human identities (usernames, passwords and 2 factor authentication) to steal valuable data from countless companies and individuals. The COVID-19 pandemic and the shift to remote work dramatically increased the risks connected with human identities as people accessed corporate networks from many new locations and devices.

But while security departments have increased their investments in protecting human identities, many are still neglecting the risks connected with machine identities. Machines of all types including hardware, software and containers all need unique identities in order to connect and communicate securely, yet most businesses have very limited security controls in place to protect them. 

Continue reading

Wolfi Linux is designed to safeguard the software supply chain

supply chain

The desire for software supply chain integrity and transparency has left many organizations struggling to build in software security measures like signatures, provenance, and SBOMs to legacy systems and existing Linux distributions.

This has prompted Chainguard to produce Wolfi, a new Linux '(un)distribution' and build toolchain, that's been designed from the ground up to produce container images that meet the requirements of a secure software supply chain.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.