Latest Technology News

Fedora 35 Linux-based operating system available for download with GNOME 41

Today is the day many of us have been waiting for -- Fedora 35 is officially here! Yes, folks, you can download the operating system immediately. For many Linux users, Fedora is considered the best distribution based on the open source kernel. Why? Because Fedora focuses on truly free and open source software -- a pure Linux experience. It is also fairly bleeding edge, while at the same time, remaining stable enough for daily use.

What makes Fedora 35 exciting? This version operating system uses the brand-new GNOME 41 as its default desktop environment. GNOME 41 is notable for having significant performance improvements when using Wayland. Speaking of Wayland, Fedora 35 Beta will run faster when using it with an NVIDIA GPU. Plus, version 35 Beta gets NVIDIA with XWayland, for an improved experience when using apps that aren't designed for Wayland.

Continue reading

APIs give enterprises a security headache

api

Over the last year at least 44 percent of respondents to a new survey faced substantial issues concerning privacy, data leakage, and object property exposure with internal or external-facing APIs.

The study for Cloudentity, based on research carried out by PulseQA, shows that as a result of these issues, 97 percent of enterprises have experienced delays in releases of new applications and service enhancements due to identity and authorization issues with APIs and services.

Continue reading

Ancestry.com is offering a Black Friday special on its DNA tests

Are you still searching for that fourth cousin, twice removed? The biggest problem with family trees is that they often amass as many brick walls as new branches. We all have them -- an ancestor who showed up in 1682 on a ship that originated from England or in 1871 from Norway. The problem is that, despite all of the checking that you do in those places, they simply seem to have appeared on that boat out of vapor. 

While our grandparents may have handed us down great information about the family, remember that the data is only as good as the era from which it comes. 

Continue reading

Windows 11 has a weird problem with empty folders

Pile of empty folders

An odd problem has been found in Windows 11 that sees dozens, scores, hundreds or even thousands of empty folders being created in a directory of the System32 folder.

The fact that the folders are empty means that there is no danger of hard disks filling up, but it's a bizarre bug that has many Windows users scratching their heads. If you're affected by the issue, you'll find that your drive is littered with large numbers of folders with names ending in .tmp.

Continue reading

Poor identity management makes it easier for cybercriminals to launch attacks

identity theft mask

New research from identity security specialist One Identity shows that 95 percent of companies report challenges managing identities.

In addition 84 percent say that the number of identities they're managing has more than doubled, which means they have too many identities and credentials to keep track of, leaving holes within their network, evidenced by only 12 percent of security professionals being fully confident they can prevent a credential-based attack.

Continue reading

macOS Monterey update is bricking some Macs

macOS Monterey MacBook Pro

Microsoft may have stolen a lot of the attention with the launch of Windows 11, but Apple has also released the latest update to its own operating system -- macOS 12.

The rollout of macOS Monterey started last week, and as the update spreads, users are experiencing serious issues when performing the upgrade. More and more reports are emerging of Mac owners ending up with computers that are very unstable, or won't even power up.

Continue reading

Energy industry hit by surge in mobile phishing threats

Energy organizations provide infrastructure that's essential for the safety and well being of society, but recent events like the Colonial Pipeline breach demonstrate that the industry is particularly vulnerable to cyberattacks.

A new report on energy industry threats finds that 20 percent of energy employees have been exposed to a mobile phishing attack in the first half of 2021, a 161 percent increase from the second half of 2020.

Continue reading

Microsoft is bringing Clippy out of retirement to make an appearance in Teams

Clippy

Computer users from a certain era may remember with fondness, Clippy. The animated paperclip was an assistant in Microsoft Office, on hand to answer questions, and popping to life every now and then with hints and tips.

While some celebrated its death when the character was dropped, there were also many that mourned its passing. For anyone who falls into the second category, there is good news: Clippy is back!

Continue reading

Kingston launches FURY Renegade PCIe 4.0 NVMe SSD for PC gamers and enthusiasts

Do you need a PCIe 4.0 NVMe solid state drive? No, nobody really needs the insane speed these drives offer. However, the drool-worthy performance is certainly nice to have. Look, if you can afford such an SSD and your computer supports it at full speed, you might as well get one. I mean, why not?

Today, Kingston announces its latest such PCIe 4.0 SSD under its FURY gaming brand. Called "Renegade," it features blazing fast speeds and capacities up to 4TB. Of course, even non-gamers will want to check out the extremely high-end performance FURY Renegade offers.

Continue reading

Linux Mint Debian Edition (LMDE) 4 ditches Mozilla Firefox ESR web browser

Linux Mint is based on Ubuntu -- that is pretty common knowledge. But did you know there is a different version of the operating system that is instead based on Debian? It's true! Called "Linux Mint Debian Edition," or "LMDE" for short, it is far less popular than the "regular" Mint. Then why does it exist? Believe it or not, it exists (partly) to serve as a contingency plan in case Ubuntu ever stops being developed.

Today is November 1, and the Linux Mint developers have shared some monthly development news that is largely boring. One small tidbit of information is interesting, however; Linux Mint Debian Edition 4 (code-named "Debbie") will ditch the Mozilla Firefox ESR web browser. LMDE 4 will instead move users to the normal "rapid release" variant.

Continue reading

What businesses can do to disrupt IT silos

Now that so much of our workplace communication and collaboration has gone digital, businesses are taking steps to ensure that their teams are operating as efficiently as possible and that they’re able to serve customers’ needs. While many of the tech tools that companies have adopted or scaled up in the past couple of years have become essential lifelines to power productivity, there are potential risks that can arise if tools aren’t managed properly or if the business doesn’t have the right resources in place.

One specific challenge that poses a threat to productivity, customer experience and an organization’s bottom line is IT silos -- roadblocks that crop up when different teams use separate tools or apps that don’t integrate with others. IT silos can crop up when different groups adopt systems, apps or tools that are duplicative or unable to integrate with other digital resources. The silos are problematic for teams that need to share information and can negatively impact the team’s efficiency and effectiveness. Employees can become frustrated and burned out by the additional challenge of trying to communicate and work together with others. In addition, IT silos prevent teams from accessing the most accurate data. IT silos can take several forms, but there are action steps companies can take to address them.

Continue reading

Protecting the global supply chain: A shared responsibility

supply chain

Supply chain attacks have dominated news headlines in 2021. From SolarWinds to JBS Foods, cybercriminals are actively targeting national and international supply chains, causing widespread disruption and financial impact. Attackers understand that organizations have less control over and visibility into the security controls of a supply chain -- controls that are typically limited to legal contracts rather than true and comprehensive security policies and procedures. Common cyber supply chain risks and threats include third-party access to IT systems and weak cybersecurity practices of smaller suppliers.

Now more than ever before, protecting every part of the supply chain must be a top priority for both public and private sector organizations globally. To do this effectively, it is important to remember that securing any supply chain cannot be successfully achieved through the work of only an IT department or team. While they do play a significant role, cyber supply chain risks touch upon many different areas. Therefore, a more comprehensive, shared responsibility approach is required.

Continue reading

KB5006674 and KB5006670 updates are causing printer problems in Windows 11 Windows 10

Windows key

The seemingly never-ending stream of printer problems caused by Windows updates shows no sign of abating.

Following the Patch Tuesday releases a couple of weeks ago, Microsoft has added warnings of known issues to the support pages for the KB5006674 and KB5006670 updates. Printer-related errors including 0x000006e4 (RPC_S_CANNOT_SUPPORT), 0x0000007c (ERROR_INVALID_LEVEL), and  0x00000709 (ERROR_INVALID_PRINTER_NAME) are among those the company says users may experience.

Continue reading

The challenges for developers in the medical device sector [Q&A]

Healthcare data

Across all industries developers are under pressure to deal with rapidly shifting requirements and faster turn around times.

But in highly regulated sectors like healthcare there are extra demands to ensure safety and compliance. We spoke to Roger Mazzella, senior product manager, medical at productivity platform The Qt Company to find out how developers can address these challenges while still meeting delivery times.

Continue reading

Bringing observability and AI into your legacy modernization plan

DevOps

Through evolving legacy modernization, a clear need for automation arose to bring actionable insights to IT and DevOps teams.

Unified monitoring, log management and event management vendors are finding ways to embrace Observability in their tech stacks. And while the overall functionality doesn’t change, these adjustments have led to confusion between IT and DevOps teams. IT Operations and Service Management (ITOSM) professionals are skeptical that Observability is a marketing ploy rather than a tool that actually implements technological change. DevOps professionals, on the other hand, are hesitant of the idea of repurposing legacy tools. So what should vendors do when transitioning standard monitoring technology to use Observability in a meaningful way?

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.