Latest Technology News

Windows 11 24H2 update is a nightmare for many gamers

Ubisoft Assassin's Creed Valhalla

A Windows update without problems is a rare thing indeed, and the bigger the update, the bigger the problems. This is certainly true of the most recent major update to Windows 11, the Windows 11 24H2 update.

The release has been plagued with issues, and the most recent to be confirmed by Microsoft affects gamers. Windows 11 24H2 has been found to be so problematic with various Ubisoft titles that the update has been blocked on devices that have these games installed.

Continue reading

Google brings chess into the AI era with innovative tools and experiences

Chess, the age-old strategy game, continues to inspire advancements in artificial intelligence. Google, known for its AI breakthroughs like AlphaZero, has used chess as a proving ground for cutting-edge technology. AlphaZero famously taught itself to master chess without prior knowledge, showcasing AI’s potential for creative problem-solving. This innovation even extends beyond games, influencing real-world projects like AlphaFold for protein structures and AlphaDev for discovering new algorithms.

Now, as the title sponsor of the World Chess Championship, Google is offering new ways to experience chess, blending history, AI, and creativity. Here’s what’s on the board:

Continue reading

Forget bloated Windows 11, Windows 12 Lite is the Microsoft operating system we need!

Windows 11, despite its modern design and advanced features, has been criticized for its bloated nature. The operating system demands substantial hardware resources, leaving many users with sluggish performance -- even on newer machines -- and Microsoft is jamming AI features into almost every corner of the OS, including the likes of Notepad and Paint, which doesn't help.

Perhaps it’s time to get back to basics, trim the fat, and give users the lightweight operating system they crave without sacrificing any modern functionality? Perhaps it's time for Windows 12 Lite.

Continue reading

Is your IT agility declining because of the growth of containers?

cloud containers

Parceling up software applications into ‘containers’ is commonplace these days, having grown rapidly over the last decade. Aiming to simplify the development, testing, and delivery process, to encourage agility, it’s a way of working that continues to have wide appeal.

For the uninitiated, a container is akin to putting everything needed to run an application into a portable box. The box holds all the elements ready-made for different systems and hardware, including software, configurations, and files. As a result, applications run consistently regardless of whether they are on virtual machines, cloud platforms, or on-premise servers. 

Continue reading

Get ‘Starting an Online Business All-in-One For Dummies, 7th Edition’ for FREE and save $24!

Starting an Online Business All-in-One For Dummies is the compass you need to navigate the exciting world of e-commerce. You'll discover the latest web trends, learn the basics of designing a website, and get tips for creating a compelling online presence.

Plus, the guidance inside helps you stretch your marketing muscles to boost your brand's visibility, from the basics to more advanced strategies.

Continue reading

The role of data recovery in cyber resilience

Data Recovery is the key to achieving an effective cyber resilience strategy in the event of a cyber-attack to resume business operational resiliency. It empowers businesses to quickly recover their critical data, minimize downtime, and prevent against potential threats. Data recovery planning is crucial for business continuity, allowing organizations to seamlessly recover data and minimize the impact of an incident.

Organizations typically prioritize prevention and protection as key components of their cybersecurity approach. While essential, these measures alone are no longer enough in an evolving threat landscape. Relying solely on prevention leaves gaps, as IT teams face growing challenges in securing diverse systems. To build a comprehensive cyber resilience strategy, it is vital for businesses to recognize the importance of integrating data recovery solutions alongside preventive efforts. The rise of cybercrime, such as ransomware or malware, can devastate a company's digital infrastructure and leave the organization's data vulnerable. According to Verizon’s 2024, Data Breach Investigations Report, ransomware remains a top threat for 92 percent of all industries. This is where data recovery solutions and reactive risk controls can help when prevention fails.

Continue reading

Western Digital unveils new SanDisk and WD_BLACK storage solutions

Western Digital has introduced new storage products under its SanDisk and WD_BLACK brands, designed to meet the needs of professionals, gamers, and everyday users. With a focus on speed, durability, and capacity, these drives aim to handle a variety of data storage demands.

SanDisk has launched two portable SSDs tailored for creators and professionals who need fast, rugged storage on the go. The SanDisk Extreme PRO USB4 Portable SSD offers cutting-edge performance, featuring a USB4 interface with read speeds of up to 3,800MB/s and write speeds of 3,700MB/s. Its durable design includes a silicone shell, a forged aluminum chassis, and an IP65 rating for water and dust resistance. The drive is drop-resistant up to two meters. Expected to launch in early 2025, the SanDisk Extreme PRO will be available in 2TB and 4TB models priced at $279.99 and $429.99, respectively.

Continue reading

Get 'Big Data on Kubernetes' for FREE and save $31.99!

In today's data-driven world, organizations across different sectors need scalable and efficient solutions for processing large volumes of data.

Kubernetes offers an open-source and cost-effective platform for deploying and managing big data tools and workloads, ensuring optimal resource utilization and minimizing operational overhead. If you want to master the art of building and deploying big data solutions using Kubernetes, then this book is for you.

Continue reading

Have we gotten observability backwards?

The last few years have seen digital transformation dramatically increase the sprawl and complexity of enterprise IT environments. Today, the average employee will likely access a dozen applications before lunchtime, both in the cloud and on-prem. This increased complexity has simultaneously created greater interdependences between applications, while also making visibility much trickier for IT teams. 

The upshot of this is a world where there are more applications in use, which are less able to be monitored, and causing greater frustration when they experience issues. This is not a recipe for success.

Continue reading

Overcoming the skills gap with robust, easy-to-use AI

plugging a gap

When it comes to adopting new technologies, the legal sector has traditionally been more cautious than other industries. However, AI’s potential to transform legal workflows and unlock new levels of productivity is difficult to ignore. In fact, the industry is moving at speed: a recent study shows almost three quarters (73 percent) of legal practitioners plan to utilize AI in their legal work within the next year.

On a practical level, AI is evolving so quickly that across many practices, employees have varying levels of knowledge and understanding of how AI works, what tasks they should be using it for and the legal implications of using it. At the same time, if firms introduce AI solutions that require deep technical knowledge to use, skills gaps could become increasingly problematic.

Continue reading

Businesses not confident in their ability to detect deepfakes

Nearly half of businesses admit they are only partially confident in their ability to detect deepfakes, leaving them vulnerable to escalating fraud risks according to a new report.

The report from identity solutions company Regula shows 59 percent of businesses consider video deepfakes a serious threat, while 58 percent feel the same about audio deepfakes.

Continue reading

Technical implementation guide: Securing Salesforce under DORA requirements

As financial institutions prepare for the EU's Digital Operational Resilience Act (DORA) enforcement in January 2025, IT teams face a complex challenge: ensuring their Salesforce implementations meet new technical requirements while maintaining operational efficiency.

The regulation's focus on ICT risk management demands a comprehensive technical approach beyond basic security measures. For organizations utilizing Salesforce as a critical business platform, this represents a fundamental shift in how system architecture and security must be approached.

Continue reading

Best Windows apps this week

Six-hundred-twenty-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released Bing Wallpaper to the Microsoft Store this week. It is not in our list of recommendations though, as Microsoft added lots of PUP -- potentially unwanted programs -- functions to it, including auto-installation of other software, options to decode cookies in non-Microsoft browsers, prompts to make Bing the default search and homepage, and more. I have added an alternative to the list of apps below.

Continue reading

Why zero trust can't be fully trusted

Despite its promise, the Zero Trust approach to cybersecurity is often more notional than actual in its deployment. Many companies today are far from getting the most of what a truly Zero Trust system can offer. Gartner estimates that only 10 percent of large organizations will have a mature and comprehensive Zero Trust system by 2026. What’s more, continual reliance on human operators means that by default Zero Trust systems can only be as dependable as the people using them. This awkward fact should be kept in view before we put too much faith in systems that are described as ‘Zero Trust’. However, Zero Trust can be made to live up to its name with the addition of new tools that remove the vulnerabilities of the standard approach to using this system.

Zero Trust works by enforcing a blanket rule that all access requests must be authenticated. Unfortunately, the promise of ‘never trust, always verify’ falls apart when human beings enter the picture. Human beings configure the security tools, make judgments where an exception may be needed, and assemble the underlying IT infrastructure. All of that adds up to a lot of trust in human operators and a major caveat for Zero Trust. 

Continue reading

Apple's approach to MDM and what we can learn from it [Q&A]

The rise of hybrid and remote working has put added emphasis on the need for mobile device management (MDM).

We spoke to Weldon Dodd, SVP of global solutions at cloud-based automation and device management specialist Kandji, to find out more about Apple's approach to MDM and the broader lessons businesses can apply from this in order to solve complex IT challenges.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.