Latest Technology News

HP Dev One laptop running System76's Ubuntu Linux-based Pop!_OS now available

Last month, the open source community was abuzz with excitement following a shocking announcement from System76 that HP was planning to release a laptop running the Pop!_OS operating system. This was significant for several reasons, but most importantly, it was a huge win for Linux users as yet another hardware option was becoming available. Best of all, HP employees have been trained by System76 to offer high-quality customer support. If you aren't aware, System76 support is legendary.

At the time of the announcement, details about the hardware were a bit scarce, but I am happy to report we now have full system specifications for the 14-inch HP Dev One laptop. Most interestingly, there is only one configuration to be had. The developer-focused computer is powered by an octa-core AMD Ryzen 7 PRO 5850U APU which features integrated Radeon graphics. The notebook comes with 16GB RAM and 1TB of NVMe storage, both of which can be user-upgraded later if you choose.

Continue reading

Data-driven tools prove key to business growth

Data and analytics are instrumental to helping organizations successfully solve problems and 84 percent of organizations have either already deployed or have data-driven projects on their roadmaps.

A new study from Foundry shows data-driven projects continue to accelerate as 34 percent of organizations state that they have already deployed or implemented them compared to 28 percent of organizations saying the same in 2021.

Continue reading

Are robotics set to play a starring role in the next ten years of British manufacturing?

Technology is constantly changing our day-to-day lives and has had a particular impact on the working world. Automation is fast becoming a key conversation within multiple industries in Great Britain, including manufacturing with robotics emerging as the solution.

Over the past few years, a need to move towards more automation in the manufacturing industry has been seen. In fact, a survey done by ABB Robotics found that of 250 SME and manufacturing companies, 81.2 percent were considering incorporating robotics into their processes to combat issues with workforce shortages and supply chain disruptions.

Continue reading

Enterprises overspend by millions on cloud services

New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.

A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.

Continue reading

The secret sauce to finding files, emails and other enterprise data

Finding the right file, email and other internal data without enterprise search is like grilling without barbecue sauce. It is theoretically possible, but who would even want to try?

While Internet search engines like Google specialize in directing you to the right website, enterprise search products do a deep dive into an organization’s own data. The secret sauce to enterprise search is indexing. Indexing "pre-processes" Microsoft Office files, PDFs, emails plus attachments, compressed archives and other web-ready data.

Continue reading

Get Avast BreachGuard 2022 for as little as $5 to protect yourself from online breaches

It’s almost inevitable that at least one of your online accounts has been hacked in the past, and while you can manually check for such breaches using websites like Have I Been Pwned, keeping on top of new breaches (never mind existing ones) can be a chore.

This is where Avast BreachGuard rides to the rescue. This standalone tool provides a continuous monitoring service for all your email addresses and passwords, enabling you to take timely action whenever a new breach is detected.

Continue reading

Why data lineage matters and why it's so challenging

Change introduces risk. It’s one of those foundational principles of software development that most of us learned very early in our careers. Nevertheless, it always seems to keep cropping up in spite of those repeated life lessons. Our inability to foresee the impact of changes, even small ones, often leads to negative outcomes.

As the complexity of interconnected IT systems has increased, this problem has grown worse. It’s harder and harder to predict how even a small modification might impact systems upstream or downstream of the change. Data lineage accomplishes that, but it’s extraordinarily difficult to do data lineage well.

Continue reading

Get 'Modern DevOps Practices' ($35.99 value) FREE for a limited time

Containers have entirely changed how developers and end-users see applications as a whole. With Modern DevOps Practices, you'll learn all about containers, their architecture and benefits, and how to implement them within your development lifecycle.

You'll discover how you can transition from the traditional world of virtual machines and adopt modern ways of using DevOps to ship a package of software continuously. Starting with a quick refresher on the core concepts of containers, you'll move on to study the architectural concepts to implement modern ways of application development.

Continue reading

Another Windows protocol vulnerability emerges; this time it is a Windows Search zero-day

Laptop security

Following on from the Follina security flaw, another Windows zero-day vulnerability has come to light. Dubbed SearchNightmare, the issue allows the search-ms URI protocol handler to be used to launch remotely hosted malware-ridden executables via a search window.

The protocol is normally used to perform local searches, but it can also be used to do the same with shared files on a remote host. An attacker could easily trick a victim into clicking a search-ms URI, and a method has been found to bypass the security warning that should be displayed by default.

Continue reading

0patch releases free fix for Follina vulnerability in Windows as Microsoft apparently can't be bothered

Follina patch from 0patch

This week, we have written about the Follina zero-day vulnerability that allows for remote code execution on a victim's computer. Despite having been known about for a number of weeks, Microsoft is still yet to issue a patch for the actively exploited critical security flaw, instead simply offering details of a workaround.

As has been the case in the past, a third party has come to the rescue. Micro-patching firm 0patch has released a free fix for the vulnerability -- for Windows 11, Windows 10, Windows 7 and Windows Server 2008 R2 -- which is tracked as CVE-2022-30190 and relates to the Microsoft Windows Support Diagnostic Tool (MSDT) component of Windows.

Continue reading

Top 5 issues IT departments face in 2022 and how IT pros can face these challenges

Over the past two years, IT departments have faced numerous unprecedented challenges. The rapid shift to remote work is chief among them.

However, as we progress through 2022, employees are no longer working from just their homes; they are working from everywhere. Hybrid work is becoming the norm, and with that comes significant challenges for IT Managers and departments.

Continue reading

Microsoft's new Surface Laptop Go 2 is available to pre-order today from $599

Just yesterday, we reported that Microsoft was readying a new Surface Laptop Go, with many of the specs revealed early on a Korean website.

We said that Microsoft was planning to announce the new device "in the coming weeks", but it turns out we don't have to wait anywhere near that long as the software giant today introduces the new Surface Laptop Go 2, with a starting price of $599.

Continue reading

Poor alerts hamper effective automation of threat detection

According to a new report 85 percent of IT security professionals have experienced preventable business impacts resulting from insufficient response procedures, while 97 percent say that more accurate alerting would increase their confidence in automating threat response actions.

The State of the Modern SOC report from Deepwatch is based on a survey by Dimensional Research of over 300 security professionals, working at US organizations with 1,000 or more employees.

Continue reading

APIs and cloud apps are greatest threats to enterprise security readiness

Intelligent APIs

A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).

The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).

Continue reading

Almost half of IT security leaders believe they won't be breached

A new study shows 47 percent of security leaders do not believe they will be breached despite the increasing sophistication and frequency of attacks.

The survey of 1,000 IT and security professionals across eight countries, conducted by The Enterprise Strategy Group for Illumio finds in the past two years alone 76 percent have been attacked by ransomware and 66 percent have experienced at least one software supply chain attack.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.