Latest Technology News

AI's emergence in strategic business functions: Is procurement getting left behind?

50 percent of respondents to a recent McKinsey survey reported that their companies adopted artificial intelligence (AI) in at least one business function in 2020. As interest and investment in AI and machine learning (ML) continue to grow across different business functions, is Procurement keeping pace with its business unit counterparts?

Procurement value generation is heavily dependent on fast access to accurate data; while other business functions are automating decisioning using AI, in many organizations today Procurement is still working manually just to collect and clean source data before even getting to the decisioning stage.

Continue reading

Understanding the economics of cloud: Four guiding principles for evaluating your cloud investment

Cloud dollars

COVID-19 has not only accelerated the move to cloud and the digital transformation journey, but it has also put cost reduction initiatives squarely in the limelight. Reducing costs has always been a top priority for IT departments but the pandemic has accelerated its importance over the past 12 months. In fact, according to Deloitte cost reduction initiatives have increased 74 percent since pre-COVID, with 40 percent of organizations planning to grow their cost reduction strategies in the next 12 months. However, undertaking a large-scale digital transformation with either a flat or declining budget is no mean feat. 

To achieve this, organizations often look to the cloud, and it has become a common assumption that migration to the cloud translates to reduced costs. The reality though can be a very different story. In fact, without the right cloud provider, the true costs of cloud computing can add up fast. So how do organizations choose the best cloud provider for their business, and are hyperscalers like Amazon Web Services and Microsoft Azure good investments?

Continue reading

Windows 365 lets you stream Windows 10 and Windows 11 from the cloud to any device -- including Mac, iPad, Android and Linux

When Windows 10 was announced back in 2014, Microsoft caused alarm bells to ring when it said the new operating system would be free "for the first year", and referring to it "as a service". That led to speculation that the software giant would start charging a monthly fee for Windows 10, much as it does for Office with Microsoft 365.

That never came to pass, but today at its Inspire 2021 conference Microsoft takes the wraps off Windows 365, a cloud-based Windows subscription service.

Continue reading

AI goes mainstream for delivering service desk management

Using artificial intelligence to streamline their service desk operations is something that 93 percent of businesses are planning according to a new survey.

The study conducted by IDG for Freshworks shows 61 percent of IT managers have already deployed AI at some level and 32 percent are exploring the possibilities.

Continue reading

New solution helps manage identities and entitlements

identity management

Businesses are increasingly adopting the public cloud, but this brings with it a number of security challenges that traditional tools struggle to handle.

Identity specialist Attivo Networks is launching a new Cloud Infrastructure Entitlement Management (CIEM) solution designed to improve visibility and reduce the attack surface for identities and entitlements in the cloud.

Continue reading

Microsoft shares some of the design ideas behind Windows 11

Windows 11 design

Windows 11 is almost upon us. While the look may not be radically different to Windows 10 -- evolution over revolution is a phrase you'll hear bandied around -- it is still different enough for the changes to be instantly noticeable.

You may be wondering just how and why Microsoft took the design decisions it did with Windows 11. To help sate this curiosity, the Microsoft Design team has given us a fascinating insight into the process and the philosophy that underpins everything.

Continue reading

Microsoft releases KB5004237 and KB5004245 to fix dozens of Windows 10 problems

Microsoft headquarters

Yesterday was Patch Tuesday, and as such Microsoft released updates to fix a batch of problems with Windows 10.

There are fixes for security issues as well as other niggles, including addressing the PrintNightmare vulnerability. KB5004237 is available for Windows 10 versions 2004, 20H2 and 21H1, while KB5004245 is just for version 1909.

Continue reading

Apple finally launches MagSafe Battery Pack for iPhone 12 line of smartphones

Apple's iPhone smartphones have historically offered very good battery life comparatively. In fact, in my experience, Apple's devices typically last a lot longer than many Android phones. This is despite Android phones often having larger batteries. Apple simply does a better job of optimizing its software. Not to mention, since the company designs its own hardware (including processors), Android-makers simply cant compete in this regard.

Even though Apple iPhone 12 battery life is reportedly great (except maybe for the mini model), the company has finally launched a MagSafe Battery Pack. This accessory is primarily designed for hardcore iPhone users that never put the device down. This battery attaches to the rear of the phone using magnets and extends its usage time. Just make sure to keep it away from your pacemaker!

Continue reading

Download Tails Linux 4.20, man

Hey, man. Want to know something totally far out? The privacy-focused Linux-based operating system, Tails, has achieved version 4.20. How groovy! If you aren't familiar, Tails is designed to run from an optical disk or USB drive and hide your browsing activity. It is particularly handy for journalists or computer users living in countries ruled by oppressive governments.

Version 4.20 of Tails receives several improvements. For instance, OnionShare has been updated to 2.2 and KeePassXC is now at 2.6.2. More importantly, the Tor Browser has been updated to 10.5.2 and the Linux kernel now sits at 5.10.46. Most significant, however, there are massive enhancements when connecting to a Tor network, including a new assistant.

Continue reading

The three industries experiencing a technological revolution

digital transformation

If I asked you to think of an industry that has been revolutionized by technology, you’d probably have no problem answering. In fact, the more difficult question might be naming an industry that hasn’t experienced digital transformation, particularly in the past year.

It’s clear that some industries are more technologically advanced than others. Naturally, technology businesses including Apple, Microsoft, and Google are leading the way. Media, financial services, and energy providers are some of the most digitized sectors. Some sectors, meanwhile, are still in their digital infancy. But that’s about to change. Here, we detail three sectors that are on the cusp of a digital revolution.

Continue reading

Using technology to boost engagement in video meetings

video conference

Since the shift to virtual and hybrid working, we’ve all experienced some form of video fatigue. Whether it be back to back video meetings discussing different topics or enduring a meeting that has lasted well over an hour, the era of virtual meetings can be challenging and as a result can lead to unengaged attendees.

While these challenges may be hard to overcome and are a common problem for all, there are a number of different tools and technologies that organizations can implement to have a positive impact on productivity and engagement during video meetings.

Continue reading

Security leaders want to give people more freedom -- but restrict it

A new survey of 200 enterprise IT and security leaders appears to uncover a fundamental paradox. 96 percent of respondents called for an expansion of IT freedom, while 91 percent say that enterprises also need to put more IT restrictions in place.

The study from OS isolation company Hysolate finds that in the post-COVID world businesses face demands to press for changes to IT security policies to simultaneously increase employee productivity while also enhancing the organization’s ability to ward off ransomware and other attacks.

Continue reading

Vertagear launches elegant gaming chair that is covered in beautiful Swarovski Crystals

When people think of PC gaming gear, they aren't likely to think of furniture. Instead, they probably conjure images in their heads of mice, keyboards, and controllers. But the gamer's computer and monitor need to sit upon a desk or table, right? And of course, the players themselves need to sit in a chair. So, yes, gamers do need furniture.

Believe it or not, gaming chairs are a things these days, providing extra comfort for long gameplay sessions. Not to mention, these chairs look cool, appealing to the style of gamers. One of the companies that makes such chairs, Vertagear, has a model called PL4500. And now, that chair is getting a special new variant. You see, Vertagear has partnered with Swarovski to emblazon the PL4500 with beautiful crystals. Très chic!

Continue reading

Insider breaches hit 94 percent of organizations

Insider threat

Insider data breaches have been experienced by 94 percent of organizations in the past year, according to a new survey of 500 IT leaders and 3,000 employees in the US and UK, from email security company Egress.

Human error is the top cause of serious incidents, according to 84 percent of IT leaders surveyed. However, respondents are more concerned about malicious insiders, with 28 percent saying that intentionally malicious behavior is their biggest fear.

Continue reading

Tweak the registry to make sure you're protected against the PrintNightmare Windows vulnerability

Microsoft building logo

The accidental revelation of the PrintNightmare security vulnerability in Windows set off a chain of workarounds, third-party patches, official patches and problems with patches. But even after two weeks of back and forth, there are still steps you need to take to ensure that you're fully protected.

Microsoft recently updated its security advisory notice about the vulnerability to include additional details that system administrators should check. A quick visit to the registry is all it takes to ensure complete security.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.