Microsoft Office and OneNote now available for Amazon Fire tablets
Earlier today, Amazon revealed its all-new Fire HD 10 and Fire HD 10 Plus tablets. Both are more powerful than their predecessors, but priced from just $149. If you’re in the market for a low cost Android tablet, then they are definitely worth your consideration.
You can also pick up either device as part of the new Fire HD 10 Productivity Bundle which includes a 12-month Microsoft 365 Personal subscription and comes with premium Office apps, and 1TB of OneDrive cloud storage. You don’t need to buy a new tablet though as the Microsoft Office and OneNote apps are now available to install through the Amazon Appstore.
Fedora Linux 34 available for download
Woo-hoo! Today is officially the day many of us have been waiting for. Yes, Fedora Linux 34 is finally available for download. For many Linux users, Fedora is considered the best overall operating system to be based on that open source kernel. The distro focuses on truly free and open source software -- a pure Linux experience. It is also fairly bleeding edge, but at the same time, it remains stable for everyday use.
What makes Fedora 34 so exciting? Well, this version of the Linux-based operating system uses GNOME 40 as its default desktop environment, and version 40 is the most electrifying version of GNOME in years. GNOME 40 is notable for a horizontal workspace switcher and having the Dash (favorites launcher) moved to the bottom of the screen. Despite being released last week, Ubuntu 21.04 fails to comes with this version of GNOME.
Cost of ransomware more than doubles in a year
The average total cost of recovery from a ransomware attack has more than doubled in a year, increasing from $761,106 in 2020 to $1.85 million in 2021.
The latest Sophos State of Ransomware report also reveals that the average ransom paid is now $170,404, but that only eight percent of organizations managed to get back all of their data after paying a ransom, with 29 percent getting back no more than half of it.
Playing hide and seek with your data? Here's how to find that critical piece of information on your intranet -- even from a tunnel with no online connection
No matter your job, it likely requires immediate answers from your enterprise Intranet. Indexed enterprise search lets you find what you need from anywhere, while cached indexed enterprise search lets you find what you need even when you are offline.
Together, these two components can help resolve what feels like a never-ending game of file hide and seek.
Amazon's all-new Fire HD 10 and Fire HD 10 Plus tablets are better than ever
Last week, Apple took the wraps off its latest iPad Pro and it's a beast, thanks in part to being powered by the company’s own powerful 8-core M1 chip.
Not everyone has $800 (and upwards) to blow on a tablet though, and not everyone wants to buy into Apple’s ecosystem. That’s the market that Amazon targets and its new Fire HD 10 and Fire HD 10 Plus tablets are more powerful than ever, and with price tags that won’t break the bank.
Lack of asset visibility leads to more security incidents
Widening visibility gaps in cloud infrastructure, end-user devices and Internet of Things (IoT) device initiatives are leading to increased risk and security incidents according to a study carried out by Enterprise Strategy Group (ESG) for Axonius.
More than 70 percent of respondents report that additional complexity in their environments has contributed to increasing visibility gaps. More than half cite the rapid shift to remote work and changes to technology infrastructure necessitated by security and privacy regulations as key reasons for this increased complexity.
Majority of enterprises lack mature data strategy
A new study reveals that 70 percent of enterprises lack a mature data strategy. The study from cloud migration and managed services company 2nd Watch finds only 26 percent have any data strategy at all.
Most organizations recognize the importance of comprehensive data management though with 60 percent of respondents claiming to have an enterprise-wide data catalog.
Hidden settings in Windows 10 unlock new Sun Valley floating menus
Microsoft has big plans in store for Windows 10 with its upcoming Sun Valley overhaul. There are many interesting visual changes on the horizon in Windows 10 21H2, including the introduction of rounded corners and floating menus -- and, possibly, a floating Start menu too.
So far, however, the new aesthetic that the arrival of Sun Valley will bring has been limited to design mockups. But now this changes. Experimental flags in the latest builds of Windows 10 gives us our first exciting glimpse of what's to come -- and you can (with a little effort) enable the floating menus for yourself.
CFOs want to see value from digital transformation investments
Digital transformation is a priority for 80 percent of CFOs and 71 percent believe that these investments are key to their company's success.
This is according to a global survey of more than 1,500 CFOs and senior financial leaders by enterprise software services company Rimini Street which also shows that CFOs are keen to see IT investments deliver value.
How to view Wi-Fi passwords in Windows 10
Looking to find the password for a Wi-Fi connection? There are various reasons you might want to retrieve the password for a wireless network you have already connected to, but it may not be obviously how to go about it in Windows 10.
Your router may have its security details helpfully printed on a sticker on the back, but this is not necessarily very accessible when you need to get the password for a new laptop or other device. Thankfully, there is a way to view saved Wi-Fi passwords in Windows 10, helping to make life a little easier.
Thermaltake launches affordable TOUGHAIR 310 and 510 CPU coolers for PC enthusiasts
When you are a system builder, there are certain important aspects of the build that are often overlooked. For instance, many builders will opt for a cheap power supply and then wonder why their system is unstable. I know a PSU isn't as exciting as a CPU, GPU, or RAM, but it is still an important component.
Another tragically overlooked component? The CPU cooler. Maybe your processor came with a stock heatsink and fan in the box. You know what? Sometimes the included cooler can be pretty good. For the most part, however, it would be wise to spend a bit more on a third-party offering -- especially if you want to overclock your processor. Today, Thermaltake launches two affordable CPU coolers -- the TOUGHAIR 310 and 510.
Why senior management needs to make cloud backup a priority
At work and at home, backup is critical. From making photocopies of significant documents to digitizing old family photos, relying on hard drives to replicating servers, we all know that it’s important to have multiple copies of the information that matters to our families and our businesses. Knowing we should do something, however, isn’t the same as doing it consistently and well -- which is why backup often fails.
Many organizations still rely on outdated backup strategies that put the company at risk from cybercrime, human error, physical disasters and more. But because the business "already has a backup plan", or because backup isn’t a shiny new object, it can be difficult to convince senior management to make it a priority.
Reducing the carbon footprint of AI: The debate continues
The debate about the energy greediness of large AI models is raging. Recently, an AI ethics researcher at Google was dismissed because she had pinpointed the upward spiral of exploding training data sets. The fact is that the numbers make one’s head swim. In 2018, the BERT model made the headlines by achieving best-in-class NLP performance with a training dataset of 3 billion words.
Two years later, AI researchers were not working with billions of parameters anymore, but with hundreds of billions: in 2020, OpenAI presented GPT-3 -- acclaimed as the largest AI model ever built, with a data set of 500 billion words!
How biometrics is moving from verifying identity to verifying humanity
Even though 'face spoof' sounds like a piece of skateboarder terminology used to describe a particularly vicious wipeout, it’s actually something more commonly dealt with by InfoSec professionals who work for huge banks, telecommunications companies, and healthcare providers.
Simply put: it’s when a scammer uses a 3D mask -- or a printed or on-screen image -- to fool biometric security measures a la "Mission Impossible" in order to gain access to the system those security measures are in place to protect.
How government agencies are adapting to remote working [Q&A]
The last year has seen all businesses facing a major shift as employees have been forced to work from home.
Government agencies have been no exception to this, but they have specific issues relating to handling sensitive data. Last month the US Department of Agriculture (USDA) announced a plan to expand remote work options and other agencies are expected to follow suit.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.