Get ready to download macOS Big Sur
It has been a number of months since Apple first unveiled macOS Big Sur (macOS 11) with the promise that this major operating system upgrade was coming "later this year".
At yesterday's "One More Thing" event at which the company revealed details of its new M1-powered Mac Mini, MacBook Air and MacBook Pro, we also finally learned the release date for Big Sur. And the good news is that there's not long to wait -- macOS 11 is available to download from tomorrow, November 12.
Bomaker Polaris is an ultra-short-throw 4K laser projector that promises top-notch picture quality at a (relatively) affordable price [Update]
Bomaker has announced that it will soon launch a 4K ultra-short-throw laser projector on Indiegogo, and early birds can grab a substantial discount on the device when it goes live for crowdfunding.
Bomaker, which manufactures sound bars as well as projectors, has revealed the specs of the Polaris 4K Laser TV, which the firm promises delivers much better results than rival projectors (DLP or laser).
Apple unveils M1-powered Macs, and Microsoft Windows 10 is the big loser
ARM is the future of computing -- there's a reason Microsoft keeps trying to switch Windows to the new architecture. Unfortunately, Windows on ARM has not been a success, as consumers have largely rejected Microsoft's attempts. I have a Surface RT tablet that I keep in a drawer which serves as a constant reminder of what could have been.
Apple is in the midst of this switch with Mac, but it looks to have a huge success on its hands. Why? Because the iPhone-maker developed its own chips rather than just work with partners. More importantly, Apple has a very precise plan on transitioning, and consumers seem to be on board.
Plugable launches TBT3-UDZ Thunderbolt 3 and USB-C Docking Station with 100W PD
There are so many docks and docking stations nowadays, that it can be hard to get excited about them. Look, I get it, they all pretty much do the same thing -- turn your laptop into a desktop while also charging it. The thing is, not all of them are created equally. In fact, some are much better than others.
With all of that said, Plugable has a new vertical docking station that is absolutely worth your attention. Called "TBT3-UDZ," it is compatible with both Thunderbolt 3 and USB-C computers thanks to its use of Intel's Titan Ridge chipset. I am happy to say it has both an SD card reader and microSD card reader on the front -- something often omitted from docks nowadays. Thankfully, the host port is on the rear, so there is no ugly wire hanging off the front. And yes, it offers 100W power delivery.
The challenges of video conferencing interoperability
It’s a scenario we all know too well and one that has happened in workplaces around the world. As colleagues gather together in the boardroom to start an important video meeting with a client, they’re stopped in their tracks when they realize they are waiting in a Microsoft Teams Room and the client is on Google Meet.
Then the IT department find themselves on the other end of frantic calls and the inevitable question -- 'How do we get this to work?' This can be a frustrating experience, especially for organizations that have invested in expensive hardware or unified communication services.
System76 refreshes the Galago Pro and you can buy the affordable Linux laptop now
The current trend for laptops is to have them be as thin as possible. I suppose we have Apple to thank for that -- its designers often focus on form over function. As a result, many computers are missing useful ports, such as Ethernet, HDMI, and USB-A. This causes consumers to spend extra money on USB-C docks, adapters, and dongles. Thin machines often have deficient cooling too, which can lead to throttling and an overall negative impact to performance.
And that's why I love the design of System76's newly refreshed Galago Pro -- one of the company's most popular Linux laptops. The affordable Galago Pro isn't thick by any means, but it's really no thicker than it needs to be. You see, the chassis can accommodate the ports that many depend on, such as the aforementioned Ethernet, HDMI, and USB-A.
Shift to remote work drives overhaul of enterprise access technology
This year's massive and sudden shift to remote working has boosted the adoption of cloud technology and the security implications of this transition will reverberate for years to come, according to the latest Trusted Access report from Cisco company Duo Security.
Daily authentications to cloud applications surged 40 percent during the first few months of the pandemic, the bulk of these coming from enterprise and mid-sized organizations looking to ensure secure access to services.
Watch Apple's 'One More Thing' event here
Apple is hosting a new hardware event today using "One More Thing" as its tagline. The Coronavirus pandemic means that -- like events earlier in the year -- this one is pre-recorded and has no audience… but what can we expect to see launched in Cupertino, California?
We are all but certain that this event will be the one at which Apple unveils new models of MacBook Air and MacBook Pro powered by its own custom silicon. But to find out everything about the company's switch to ARM, you'll have to tune in.
DDoS attacks become smarter and easier to carry out
Although ransomware has dominated 2020's cyber threat landscape, DDoS attacks haven’t gone away. In fact the year has seen the largest DDoS attack ever recorded, peaking at 2.3 Terabytes per second.
The attack was carried out by deploying hijacked CLDAP (Connection-less Lightweight Directory Access Protocol) web servers and caused three days of downtime for the unnamed targeted business. This is one of the things highlighted in new analysis from Digital Shadows.
PowerArchiver 2021 adds new viewing and editing tools to Windows release
ConeXware has unveiled a major new version of its trialware archiving tool for Windows users with the release of PowerArchiver 2021. For the first time, PowerArchiver 2021 is also available for macOS too, although this release does not (yet) boast all the features of its Windows cousin.
Version 20.0.58 for Windows unveils tools to help view and edit files within archives without extracting them, plus promises improvements to its Pro edition-only PowerArchiver Cloud feature, and adds some welcome new tools to the Action menu.
Microsoft is going to forcibly upgrade systems running old versions of Windows 10
It is only a month until Windows 10 version 1903 reaches end of service. When December 8 rolls around, any systems running this version of the operating system will no longer receive security updates.
But Microsoft has a solution to ensure that there are not millions of unsecured computers out there -- forcibly upgrading them to a newer, supported version of Windows 10.
KIOXIA unveils XG7 NVMe PCIe 4.0 SSD
Solid state drives continue to get faster, with PCIe 4.0 variants leading the pack nowadays. Of course, most PCs don't have PCIe 4.0 support, so these ultra-fast drives are reserved for enthusiasts and those with brand new computers.
If you have such a cutting-edge PC, you will probably want to get a PCIe 4.0 SSD to maximize your performance. True, it is largely for bragging rights and benchmarks -- you probably won't notice a difference in actual use -- but still, you might as well go for the best if the difference in price isn't totally obscene.
Delivering value to a remote workforce: A practical approach
The overnight switch to remote working triggered by the COVID-19 pandemic has caused an unprecedented amount of change to the usual ways of working. The impact will continue to be felt for the foreseeable future -- and as a result, IT departments’ approach to delivering services to their organizations will need to keep pace with the evolving requirements of this newly remote staff.
To that end, IT needs to embed itself deeper in the organization to understand the unique requirements of every single stakeholder -- be it the C-suite or the manager answering the customer call -- so that those professionals can do their jobs effectively, enabling the business to realize its strategic goals. In practical terms, what does this mean? How can IT departments put these tactics into practice in their enterprises?
Redefining Security post-pandemic: Empowering change control in the new normal
Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance, and digital transformation demand landscape. Now, more than ever, it is increasingly important for organizations to embed security solutions and processes that reduce complexity and massively increase the automation of killer manual tasks.
Last month, our team at New Net Technologies had the opportunity to host a virtual panel on securing digital transformation and what COVID-19 means for cybersecurity as we continue to navigate the growing remote workforce. The panel, which consisted of several security experts, focused on the topic of redefining security in a post-pandemic world. The session kicked off with the question, 'Have you noticed a more compliant workforce?'.
The importance of TLS/SSL decryption in a zero-trust model
With upwards of two-thirds of UK adults set to work remotely for the remainder of this year, it’s clear that the pandemic will create a larger attack surface, and increase opportunities for cyber criminals. In effect, the enterprise perimeter has not only expanded but it has also become much more distributed.
Likewise, modern cyber attacks are not just limited to network intrusion from the outside. Internal threat actors can often be found at the center of sophisticated attacks. Therefore, today, threats come from both inside and outside the organization, via the business partner and supplier ecosystem, and through employees working remotely. This means we need to re-assess and re-think the way we defend our networks, users and data. For example, organizations will need more support around connecting and managing BYOD devices on the home network, including sharing of policies and tools around sensitive data, which could be accessed via insecure Wi-Fi. Additionally, with ransomware, phishing and DDoS attacks growing exponentially, they will also be looking for technologies that enable them to protect networks from cyber attacks, especially those that threaten network availability.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.