SurveyMonkey adds WhatsApp support for easier survey sharing
SurveyMonkey, a widely used platform for creating surveys and forms, has expanded its social sharing capabilities to include WhatsApp. This addition allows users to share their surveys and forms directly with WhatsApp contacts and groups, aiming to simplify the distribution process. WhatsApp joins SurveyMonkey’s existing social sharing options, which include LinkedIn, X (formerly Twitter), Facebook, and Microsoft Teams.
With over 2 billion active users globally, WhatsApp is recognized as one of the most popular messaging apps. SurveyMonkey customers in over 130 countries, speaking 56 different languages, can now leverage this integration to share surveys and forms through a platform that many already use daily. Early results have shown that the WhatsApp sharing feature has garnered twice as many clicks and shares compared to other social sharing options.
Logitech launches Sync smart office tools to streamline workplace efficiency
Logitech has introduced a range of Sync smart office tools designed to improve workplace efficiency and provide enhanced analytics for IT teams. The new suite includes Auto Book and Auto Release, which automate room reservations and cancellations based on user activity. Additionally, Logitech View offers interactive digital office maps to assist with navigation in large office spaces.
Henry Levak, VP of Product at Logitech for Business, highlighted the AI capabilities of the tools, stating, “Rally Bars use AI in-camera sensors to automatically detect and respond to natural workplace behaviors with no human intervention needed.” This approach aims to simplify room management, allowing employees to focus on collaboration while IT teams gain more accurate insights into actual room utilization.
Get 'An Introduction to Optimization: With Applications to Machine Learning, 5th Edition' for FREE and save $106!
Fully updated to reflect modern developments in the field, the Fifth Edition of An Introduction to Optimization fills the need for an accessible, yet rigorous, introduction to optimization theory and methods, featuring innovative coverage and a straightforward approach. The book begins with a review of basic definitions and notations while also providing the related fundamental background of linear algebra, geometry, and calculus.
With this foundation, the authors explore the essential topics of unconstrained optimization problems, linear programming problems, and nonlinear constrained optimization. In addition, the book includes an introduction to artificial neural networks, convex optimization, multi-objective optimization, and applications of optimization in machine learning.
OWC launches Thunderbolt 5 Hub to supercharge Mac and PC connectivity
Other World Computing (OWC) has launched the Thunderbolt 5 Hub, which promises to elevate device connectivity for Macs, PCs, and even tablets like the iPad Pro. This new hub delivers an impressive 80Gb/s of bi-directional data speed -- double that of Thunderbolt 4 and USB4 -- and supports up to 120Gb/s for users needing higher display bandwidth. With just a single cable, users can expand their device’s ports to include three Thunderbolt 5 ports and a USB-A port, making this hub a productivity game changer.
For tablet users, the OWC Thunderbolt 5 Hub is especially transformative, turning an iPad Pro or similar device into a full-fledged workstation capable of connecting to external drives, displays, and a variety of peripherals. This means users can push the limits of their tablets without the need for a laptop or desktop nearby.
Failed security controls cost businesses billions
A new report finds 61 percent of organizations have suffered a security breach in the past year because their policies, governance, and controls failed or were not working effectively. This is costing US businesses $30bn and UK businesses £10bn per year.
The study from security posture management firm Panaseer surveyed 400 security decision makers across the US and UK and found 72 percent have taken out indemnity insurance in response to growing personal liability, whilst 15 percent have considered leaving the industry.
New defense suite is designed to secure AI workloads
As organizations increasingly adopt AI capabilities, the most common and dangerous attacks often go undetected by static code scanning or traditional security methods.
The only effective way to stop common AI attacks, such as prompt injection and zero-day vulnerabilities, is through active runtime detection and defense. Operant AI is launching a new 3D Runtime Defense Suite aimed at protecting live cloud applications, including AI models and APIs in their native environments.
Microsoft’s answer to Apple Intelligence may be Windows Intelligence
Branding is important, and this is something we’ve already seen with digital assistants like Siri. Moving into the artificial intelligence era, companies have been falling over themselves to get their own stamp on their version of AI.
Apple has opted for the reasonably predictable “Apple Intelligence”, while Microsoft’s approach has been a little more haphazard. But now there are clues that suggest the company has finally come to understand the importance of giving people an overarching term to cover all of its AI-related offerings. Say hello to Windows Intelligence.
New tool helps prepare workforces for cyber threats
Humans are generally the weakest link in the cybersecurity chain, so training and awareness are essential alongside technology to keep organizations safe.
With the launch of its AI Scenario Generator, Immersive Labs enables organizations to seamlessly generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats.
Apple Find My can now share AirTag locations with airlines and third parties
Apple has launched a beta feature called Share Item Location in iOS 18.2, allowing users to share the location of an AirTag or Find My network accessory with third parties. This update is designed to simplify the process of locating misplaced items, particularly when traveling. Users can generate a secure link in the Find My app on their iPhone, iPad, or Mac, which can then be shared. The recipient can access an interactive map that shows the item’s location and updates automatically. The shared link expires after seven days or when the item is recovered, maintaining privacy and security.
“Find My is an essential tool for users around the world to keep track of and find their belongings,” said Eddy Cue, Apple’s senior vice president of Services. “The Find My network and AirTag have proven to be a powerful combination for users while traveling, providing invaluable location information when bags have been misplaced or mishandled. With Share Item Location, we’re excited to give users a new way to easily share this information directly with third parties like airlines, all while protecting their privacy.”
Logitech expands availability of refurbished products in North America and Europe
Logitech is making it easier for consumers to access refurbished devices with the expansion of its Certified Refurbished program. Now, customers in North America and Europe can purchase a wide range of products, including mice, keyboards, tablet accessories, gaming gear from Logitech G, and Bluetooth speakers through Logitech’s eBay Refurbished brand store and its own websites.
The company is tapping into a growing trend as more consumers seek out high-quality refurbished products. The appeal of these devices lies in their cost-effectiveness and environmental benefits, offering users a way to own premium technology while contributing to waste reduction.
NordVPN launches ID theft protection tool
Although it may not make the headlines as often as other forms of cybercrime, identity theft remains an issue.
Now NordVPN has launched an identity theft protection service called NordProtect. Currently available to NordVPN Prime plan users in the US, it merges years of cybersecurity expertise with cutting-edge technology to offer a solution users can trust.
Navigating the world of disinformation, deepfakes and AI-generated deception [Book Review]
Online scams aren't anything new, but thanks to artificial intelligence they're becoming more sophisticated and harder to detect. We've also seen a rise in disinformation and deepfakes many of them made possible, or at least more plausible, by AI.
This means that venturing onto the internet is increasingly like negotiating a digital minefield. With FAIK, risk management specialist at KnowBe4 Perry Carpenter sets out to dissect what makes these threats work and the motivations behind them as well as offering some strategies to protect yourself.
Mitigating third-party risk in today's cyber ecosystem [Q&A]
As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
Debian Linux 12 bookworm receives eighth update with crucial security fixes
The Debian project has announced its latest point release for Debian Linux 12, codenamed “bookworm,” marking the eighth update to this stable distribution. This 12.8 update primarily addresses security issues and fixes various critical bugs, enhancing the reliability and security of the system. Importantly, this release is not a new version but an update to existing packages within Debian 12. Users who routinely update via security.debian.org will notice only minimal changes, as most updates are rolled into this point release.
There is no need to replace existing installation media for bookworm; a simple upgrade through an up-to-date Debian mirror suffices to bring systems to the latest versions. The new installation images reflecting these updates will soon be available at Debian’s standard download sites.
Why my Apple iPhone 16 Pro Max cost more than my M4 Mac mini
Back in the day, when personal computers were first making their way into homes, buying a desktop was often a massive investment. The price tags on those early machines were no joke, especially in the ’80s and ’90s. Dropping a couple of thousand dollars on a beige box humming with potential was considered normal. Fast forward to today, and times have certainly changed -- computers, including the powerful M-series Mac minis, have become more affordable, while flagship smartphones have skyrocketed in price.
I recently bought Apple’s new base-model M4 Mac mini, which set me back $500 with the education discount ($600 regularly). For those keeping tabs, that’s for a fully functional, highly efficient desktop computer. Not too long ago, such a price would have barely covered the cost of an average, bare-bones PC tower. This particular Mac mini runs circles around most mainstream computers from just a few years ago, delivering top-notch performance at a budget-friendly price.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.