• Jon Bernthal's Punisher Will Return After Daredevil: Born Again Season 1 in a Guardians of the Galaxy-Style Marvel Special
    www.ign.com
    Jon Bernthal's Punisher will return after Daredevil: Born Again Season 1 in a Guardians of the Galaxy-style Marvel special.Entertainment Weekly reported that Bernthal will also write the Marvel special with We Own This City director Reinaldo Marcus Green."It's like a shotgun blast of a story, but also has all the pathos and emotion that you want out of a Frank Castle story," Brad Winderbaum, the head of Marvel Television, said. "It's so exciting."Daredevil: Born AgainNews of the Punisher one-shot comes as Marvel Television plots the return of the Defenders on Disney+. This street level superhero team, which includes Matt Murdock's Daredevil, Krysten Ritter's Jessica Jones, Mike Colter's Luke Cage, and Finn Jones' Iron Fist, was last seen breaking heads on Netflix before episodes were moved to Disney+ and made MCU canon.Its certainly exciting to be able to play in that sandbox, Winderbaum had previously told Entertainment Weekly. Obviously, we dont have the unlimited storytelling resources like a comic book, [where] if you can draw it, you can do it. Were dealing with actors and time and the massive scale of production in order to build a cinematic universe, especially on television.But I can just say that all those variables taken into account, it is certainly something that is creatively extremely exciting and that we are very much exploring.Daredevil: Born Again, out March 4, continues the Daredevil story that began on Netflix, and includes a number of returning characters such as the aforementioned Punisher and Vincent D'Onofrio's Wilson Fisk (Kingpin). The threat this time around is the artistically inclined serial killer Muse.Wesley is the UK News Editor for IGN. Find him on Twitter at @wyp100. You can reach Wesley at wesley_yinpoole@ign.com or confidentially at wyp100@proton.me.
    0 Commentaires ·0 Parts ·37 Vue
  • Mac market share growing faster than top three PC brands; Apple leads in AI
    9to5mac.com
    A new market intelligence report indicates that Mac market share grew at a faster rate that the top three PC brands during the final quarter of last year.Apple also dominates the AI-capable computer market, with a 45% share against 15% for the nearest Windows PC competitor While Apple holds only a 10% share of the overall PC market, putting it in 4th place behind Lenovo, HP, and Dell, Canalys says it it enjoyed the largest growth in Q4 2024. The company also thinks it is well placed for future growth in the enterprise sector.Apple finished strong in Q4 2024, significantly outgrowing the top three vendors and achieving a 10.2% market share in the total PC market and 45% share in the AI-capable PC market, added Jessop. Apples channel strategy continues to evolve as they announced the Apple Partner Network, launching later this year. This revamped program simplifies partner tiers and aims to take a share in the Enterprise segment while providing the necessary services to handle customers. The program highlights Macs compatibility and scalability within the Enterprise environment, concerns which have previously kept them out of the segment.Canalys says Lenovo leads the overall PC market.Lenovo: 25%HP: 20%Dell: 15%Apple: 10%Asus: 7%Acer: 6%Huawei: 2%Microsoft: 0.4%Others: 15%Apple leads in AI-capable PCsWhen it comes to AI-capable PCs, defined as those with an AI-specific chip, Apple dominates.For the full year 2024, 17% of PCs shipped were AI-capable, with the biggest winners being Apple at 54% [sic?] share, followed by Lenovo and HP at 12% share each.Note: Canalys says 54% in this sentence but shows 45% in the graphic and says 45% elsewhere weve reached out for clarification.The firm thinks AI capabilities arent a big deal right now, but expects them to play an increasingly important role over time.Although AI capabilities are not a primary purchasing driver, improved AI processor performance will make personalized experiences and productivity gains increasingly important and expected. Over time, this could influence brand loyalty, shaping customers decisions for future device upgrades.But Trumps tariffs could threaten PC growthCanalys says that while the overall PC market is strong, largely driven by enterprise companies being forced to replace older models due to Microsoft ending support for Windows 10, Trumps 10% tariff on all imports from China is a threat.Looming trade policy shifts in the US [] could hamper the upcoming commercial refresh cycle and dampen an already muted consumer outlook. So far, the Trump administration has placed a 10% tariff on all Chinese imports, which accounts for a significant majority of laptops shipped to the US.Photo byArvind MenononUnsplashAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Commentaires ·0 Parts ·38 Vue
  • Return to inbox: this new iPhone Mail setting fixes one of the apps most annoying quirks
    9to5mac.com
    One of the longest standing feature requests for Apple Mail on iPhone is for the app to change how it behaves when a user moves a message to a different folder, or sends it to the trash. Until iOS 18.4, the Mail app would always automatically move on to the next message in the inbox, which would annoyingly cause that unrelated message to be marked as read in the process. What many users have asked for, is for the app to simply return to the inbox list instead. iOS 18.4 finally makes that possible.Automatically moving on to another message after sending an email to the trash is a pretty unexpected behavior, as most other email apps do not work this way. In fact, this quirk of Mail has been the sole reason some iPhone owners have resorted to third-party apps, like Spark or Outlook.But with Apple Mail getting better all the time, and especially with useful Apple Intelligence additions like summaries and smart replies, Mail is getting attention once again. And this tiny little change in iOS 18.4 may just be the catalyst for many users to come back to the Apple native app.With iOS 18.4, theres a new Mail setting called Delete or Move Message Action. The default action is View Next Message, which preserves the long-standing default behavior. But if you change to the new option of Dont Select a Message, the Mail app will no longer navigate to another email and instead simply returns to the inbox list.More specifically, after deleting an email, the app jumps back one screen to your list of emails. That allows the user to select another message of their choosing and continue to triage their inbox.You can find this setting by opening the Setting app, and going to Apps -> Mail -> Message List -> Delete or Move Message Action.This small-but-much-welcomed change is part of iOS 18.4, which is currently in developer beta and public beta testing stages. You can expect iOS 18.4 to be released as a free software update for all iPhone users sometime in April.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Commentaires ·0 Parts ·38 Vue
  • SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent
    thehackernews.com
    Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it's clear this isn't just a human problemit's a math problem. There are simply too many threats and security tasks for any SOC to manually handle in a reasonable timeframe. Yet, there is a solution. Many refer to it as SOC 3.0an AI-augmented environment that finally lets analysts do more with less and shifts security operations from a reactive posture to a proactive force. The transformative power of SOC 3.0 will be detailed later in this article, showcasing how artificial intelligence can dramatically reduce workload and risk, delivering world-class security operations that every CISO dreams of. However, to appreciate this leap forward, it's important to understand how the SOC evolved over time and why the steps leading up to 3.0 set the stage for a new era of security operations.A brief history of the SOCFor decades, the Security Operations Center (SOC) has been the front line for defending organizations against cyber threats. As threats become faster and more sophisticated, the SOC must evolve. I've personally witnessed three distinct phases of SOC evolution. I like to refer to them as SOC 1.0 (Traditional SOC), SOC 2.0 (the current, partly automated SOC), and SOC 3.0 (the AI-powered, modern SOC).In this article I provide an overview of each phase, focusing on four core functions:Alert triage and remediationDetection & correlation Threat investigation Data processing SOC 1.0: The traditional, manual SOCLet's take a look at how the earliest SOCs handled alert triage and remediation, detection & correlation, threat investigation and data processing.Handling noisy alerts with manual triage & remediationIn the early days, we spent an inordinate amount of time on simple triage. Security engineers would build or configure alerts, and the SOC team would then struggle under a never-ending flood of noise. False positives abounded.For example, if an alert fired every time a test server connected to a non-production domain, the SOC quickly realized it was harmless noise. We'd exclude low-severity or known test infrastructure from logging or alerting. This back and forth"Tune these alerts!" or "Exclude this server!"became the norm. SOC resources were invested more in managing alert fatigue than in addressing real security problems.Remediation, too, was entirely manual. Most organizations had a Standard Operating Procedure (SOP) stored in a wiki or SharePoint. After an alert was deemed valid, an analyst would walk through the SOP:"Identify the affected system""Isolate the host""Reset credentials""Collect logs for forensics", and so on.These SOPs lived primarily in static documents, requiring manual intervention at every step. The main tools in this process were the SIEM (often a platform like QRadar, ArcSight, or Splunk) combined with collaboration platforms like SharePoint for knowledge documentation.Early SIEM and correlation challenges During the SOC 1.0 phase, detection and correlation mostly meant manually written queries and rules. SIEMs required advanced expertise to build correlation searches. SOC engineers or SIEM specialists wrote complex query logic to connect the dots between logs, events, and known Indicators of Compromise (IOCs). A single missed OR or an incorrect join in a search query could lead to countless false negatives or false positives. The complexity was so high that only a small subset of expert individuals in the organization could maintain these rule sets effectively, leading to bottlenecks and slow response times. OnlyExperts for L2 & L3 threat investigation Threat investigations required highly skilled (and expensive) security analysts. Because everything was manual, each suspicious event demanded that a senior analyst perform log deep dives, run queries, and piece together the story from multiple data sources. There was no real scalability; each team could only handle a certain volume of alerts. Junior analysts were often stuck at Level 1 triage, escalating most incidents to more senior staff due to a lack of efficient tools and processes.Manual pipelines for data processing With big data came big problems such as manual data ingestion and parsing. Each log source needed its own integration, with specific parsing rules and indexing configuration. If you changed vendors or added new solutions, you'd spend months or even multiple quarters on integration. For SIEMs like QRadar, administrators had to configure new database tables, data fields, and indexing rules for each new log type. This was slow, brittle, and prone to human error. Finally, many organizations used separate pipelines for shipping logs to different destinations. This was also manually configured and likely to break whenever sources changed.In short, SOC 1.0 was marked by high costs, heavy manual effort, and a focus on "keeping the lights on" rather than on true security innovation.SOC 2.0: The current, partly automated SOCThe challenges of SOC 1.0 spurred innovation. The industry responded with platforms and approaches that automated (to some degree) key workflows.Enriched alerts & automated playbooksWith the advent of SOAR (Security Orchestration, Automation, and Response), alerts in the SIEM could be enriched automatically. An IP address in an alert, for example, could be checked against threat intelligence feeds and geolocation services. A host name could be correlated with an asset inventory or vulnerability management database. This additional context empowered analysts to decide faster whether an alert is credible. Automated SOPs was another big improvement. SOAR tools allowed analysts to codify some of their repetitive tasks and run "playbooks" automatically. Instead of referencing a wiki page step by step, the SOC could rely on automated scripts to perform parts of the remediation, like isolating a host or blocking an IP.However, the decision-making piece between enrichment and automated action remained highly manual. Analysts might have better context, but they still had to think through what to do next. And to make matters worse, the SOAR tools themselves (e.g., Torq, Tines, BlinkOps, Cortex XSOAR, Swimlane) needed extensive setup and maintenance. Expert security engineers had to create and constantly update playbooks. If a single external API changed, entire workflows could fail. Simply replacing your endpoint vendor would trigger weeks of catch up in a SOAR platform. The overhead of building and maintaining these automations is not exactly trivial.Upgraded SIEM: Out-of-the-box detection & XDRIn SOC 2.0, detection and correlation saw key advances in out-of-the-box content. Modern SIEM platforms and XDR (Extended Detection and Response) solutions offer libraries of pre-built detection rules tailored to common threats, saving time for SOC analysts who previously had to write everything from scratch. Tools like Exabeam, Securonix, Gurucul and Hunters aim to correlate data from multiple sources (endpoints, cloud workloads, network traffic, identity providers) more seamlessly. Vendors like Anvilogic or Panther Labs provide libraries of comprehensive rule sets for various sources, significantly reducing the complexity of writing queries.Incremental improvements in threat investigationDespite XDR advances, the actual threat investigation workflow remains very similar to SOC 1.0. Tools are better integrated and more data is available at a glance, but the analysis process still relies on manual correlation and the expertise of seasoned analysts. While XDR can surface suspicious activity more efficiently, it doesn't inherently automate the deeper forensic or threat-hunting tasks. Senior analysts remain crucial to interpret nuanced signals and tie multiple threat artifacts together.Streamlined integrations & data cost controlData processing in SOC 2.0 has also improved with more Integrations and better control over multiple data pipelines. For example, SIEMs like Microsoft Sentinel offer automatic parsing and built-in schemas for popular data sources. This accelerates deployment and shortens time-to-value. Solutions like CRIBL allow organizations to define data pipelines once and route logs to the right destinations in the right format with the right enrichments. For example, a single data source might be enriched with threat intel tags and then sent to both a SIEM for security analysis and a data lake for long-term storage.These improvements certainly help reduce the burden on the SOC, but maintaining these integrations and pipelines can still be complex. Moreover, the cost of storing and querying massive volumes of data in a cloud-based SIEM or XDR platform remains a major budget item.In sum, SOC 2.0 delivered significant progress in automated enrichment and remediation playbooks. But the heavy liftingcritical thinking, contextual decision-making, and sophisticated threat analysisremains manual and burdensome. SOC teams still scramble to keep up with new threats, new data sources, and the overhead of maintaining automation frameworks.SOC 3.0: The AI-powered, modern SOCEnter SOC 3.0, where artificial intelligence and distributed data lakes promise a quantum leap in operational efficiency and threat detection.AI-driven triage & remediationThanks to breakthroughs in AI, the SOC can now automate much of the triage and investigation process with AI. Machine learning modelstrained on vast datasets of normal and malicious behaviorcan automatically classify and prioritize alerts with minimal human intervention. AI models are also packed with security knowledge which helps augment human analysts' capability to efficiently research and apply new information to their practices. Instead of building rigid playbooks, AI dynamically generates response options. Analysts can review, modify, and execute these actions with a single click. Once a SOC team gains trust in AI-augmented responses they can let the system remediate automatically, further reducing response times.This doesn't eliminate human oversight, with humans-in-the-loop reviewing the AI's triage reasoning and response recommendations, but it does drastically reduce the manual, repetitive tasks that bog down SOC analysts. Junior analysts can focus on high-level validation and sign-off, while AI handles the heavy lifting. Adaptive detection & correlationThe SIEM (and XDR) layer in SOC 3.0 is far more automated with AI/ML models, rather than human experts, creating and maintaining correlation rules. The system continuously learns from real-world data, adjusting rules to reduce false positives and detect novel attack patterns.Ongoing threat intelligence feeds, behavioral analysis, and context from across the entire environment come together in near real-time. This intelligence is automatically integrated, so the SOC can adapt instantly to new threats without waiting for manual rule updates.Automated deep-dive threat investigationsArguably the most transformative change is in how AI enables near-instantaneous investigations with no need to codify. Instead of writing a detailed manual or script for investigating each type of threat, AI engines process and query large volumes of data and produce contextually rich investigation paths.Deep analysis at high speed is all in a day's work for AI as it can correlate thousands of events and logs from distributed data sources within minutes and often within seconds, surfacing the most relevant insights to the analyst.Finally, SOC 3.0 empowers junior analysts as even a Level 1 or 2 analyst can use these AI-driven investigations to handle incidents that would traditionally require a senior staff member. Vendors in this space include startups offering AI-based security co-pilots and automated SOC platforms that drastically shorten investigation time and MTTR.Distributed data lakes & optimized spendWhile the volume of data required to fuel AI-driven security grows, SOC 3.0 relies on a more intelligent approach to data storage and querying:Distributed data lakeAI-based tools don't necessarily rely on a single, monolithic data store. Instead, they can query data where it residesbe it a legacy SIEM, a vendor's free-tier storage, or an S3 bucket you own.This approach is critical for cost optimization. For instance, some EDR/XDR vendors like CrowdStrike or SentinelOne offer free storage for 1st party data, so it's economical to keep that data in their native environment. Meanwhile, other logs can be stored in cheaper cloud storage solutions.Flexible, on-demand queriesSOC 3.0 enables organizations to "bring the query to the data" rather than forcing all logs into a single expensive repository. This means you can leverage a cost-effective S3 bucket for large volumes of data, while still being able to rapidly query and enrich it in near real-time.Data residency and performance concerns are also addressed by distributing the data in the most logical locationcloser to the source, in compliance with local regulations, or in whichever geography is best for cost/performance trade-offs.Avoiding vendor lock-inIn SOC 3.0, you're not locked into a single platform's storage model. If you can't afford to store or analyze everything in a vendor's SIEM, you can still choose to keep it in your own environment at a fraction of the costyet still query it on demand when needed.ConclusionFrom a CISO's vantage point, SOC 3.0 isn't just a buzzword. It's the natural next step in modern cybersecurity, enabling teams to handle more threats at lower cost, with better accuracy and speed. While AI won't replace the need for human expertise, it will fundamentally shift the SOC's operating modelallowing security professionals to do more with less, focus on strategic initiatives, and maintain a stronger security posture against today's rapidly evolving threat landscape.About Radiant SecurityRadiant Security provides an AI-powered SOC platform designed for SMB and enterprise security teams looking to fully handle 100% of the alerts they receive from multiple tools and sensors. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, cuts response times from days to minutes, and enables analysts to focus on true positive incidents and proactive security. Unlike other AI solutions which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers' existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional SIEM solutions.Learn more about the leading AI SOC platform.About Author: Shahar Ben Hador spent nearly a decade at Imperva, becoming their first CISO. He went on to be CIO and then VP Product at Exabeam. Seeing how security teams were drowning in alerts while real threats slipped through, drove him to build Radiant Security as co-founder and CEO.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.
    0 Commentaires ·0 Parts ·23 Vue
  • New Linux Malware Auto-Color Grants Hackers Full Remote Access to Compromised Systems
    thehackernews.com
    Feb 26, 2025Ravie LakshmananLinux / Endpoint SecurityUniversities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42."Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized software," security researcher Alex Armstrong said in a technical write-up of the malware.Auto-color is so named based on the file name the initial payload renames itself post installation. It's currently not known how it reaches its targets, but what's known is that it requires the victim to explicitly run it on their Linux machine.A notable aspect of the malware is the arsenal of tricks it employs to evade detection. This includes using seemingly-innocuous file names like door or egg, concealing command-and-control (C2) connections, and leveraging proprietary encryption algorithms for masking communication and configuration information.Once launched with root privileges, it proceeds to install a malicious library implant named "libcext.so.2," copies and renames itself to /var/log/cross/auto-color, and makes modifications to "/etc/ld.preload" for establishing persistence on the host."If the current user lacks root privileges, the malware will not proceed with the installation of the evasive library implant on the system," Armstrong said. "It will proceed to do as much as possible in its later phases without this library."The library implant is equipped to passively hook functions used in libc to intercept the open() system call, which it uses to hide C2 communications by modifying "/proc/net/tcp," a file that contains information on all active network connections. A similar technique was adopted by another Linux malware called Symbiote.It also prevents uninstallation of the malware by protecting the "/etc/ld.preload" against further modification or removal.Auto-color then proceeds to contact a C2 server, granting the operator the ability to spawn a reverse shell, gather system information, create or modify files, run programs, use the machine as a proxy for communication between a remote IP address and a specific target IP address, and even uninstall itself by means of a kill switch."Upon execution, the malware attempts to receive remote instructions from a command server that can create reverse shell backdoors on the victim's system," Armstrong said. "The threat actors separately compile and encrypt each command server IP using a proprietary algorithm."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Commentaires ·0 Parts ·37 Vue
  • How CIOs Can Navigate Their Jobs in the AI Era
    www.informationweek.com
    Jean-Philippe Avelange, CIO, ExpereoFebruary 26, 20254 Min ReadPaul Brady via Alamy StockAs tech leaders, we know that AI is not a new concept. The tireless workhorse has been quietly operating in applications ranging from automation and data analysis to gaming and search engines for decades. So, we can be forgiven if its sudden and explosive popularity among the public surprised many of us, including chief information officers.Its not just the extreme pace at which AI has evolved or the ever-growing dearth of generative AI applications that has the C-suite rethinking its tech priorities. A substantial percentage of executives are scratching their collective heads about who will be tasked with tapping AIs potential, who will keep AI expectations realistic, and, perhaps most importantly, where we will find workers with the requisite skills to keep pace with technological demands.Searching for SkillsAccording to research from our company and IDC, businesses in every significant sector are adopting increasingly complex AI technologies as they seek to automate repetitive tasks, drive innovation, and increase productivity. Surprisingly, theyre not finding that they are replacing their workers with AI robots, as many anticipated and feared; instead, enterprises everywhere are struggling to find workers with the skills required to meet growing and more complicated AI needs.Related:Over one-third of the 650 companies surveyed contended a skills-based worker shortage could cause delays or worse for their 2025 AI initiatives. Workers with experience with cybersecurity, networking, data, and automation are in high demand and are also most challenging to come by, according to Enterprise Horizons 2024.There needs to be more than recruitment to advance AI programs in 2025. To meet their goals, organizations must also implement reskilling and training programs. In the interim, external tech partners will be critical to keeping AI initiatives moving forward as companies recruit and retrain.CIO: Agents of ChangeCIOs are poised to serve as agents of change, helping usher in and implement new AI apps and services. As this happens, its never been more critical for the CIO to align technology with business strategy to deliver consistent communications to board members and the rest of the C-suite, and this will be pivotal to advancing the companys AI programs in 2025. With 47% of Enterprise Horizons 2024 respondents reporting that their board has unrealistic demands regarding the impact of AI, it will be crucial for the CIO to act as a conduit between executive management and the rest of the organization. Not just to help temper board expectations about AI but also to act as a translator to effectively relay the companys technological needs in simplified, streamlined language.Related:This is when CIOs should ask themselves, What problems are we trying to solve? The answer to that question will help guide the organizations AI strategy and fill skills gaps. Amidst all the hype, it is incumbent upon the CIO to take a breath and remember that they are still solving problems -- they just have access to different tools to solve them.As the CIO role shifts toward change agent, translator, and strategist in 2025, savvy businesses will seek a leader who oversees their organization's AI strategy and implementation. This is where the new, somewhat nebulous role of chief AI officer (CAIO) enters. Although 40% of technology leaders say a CAIO role will take over much of the CIOs responsibilities within two years, and 38% are worried that AI could replace their or their teams role, we need to consider the possibility that the CAIO role can complement the CIO role, not replace it.The CIO and CAIO can accomplish more as a team than either role can achieve. With 64% of surveyed business leaders reporting that they find it challenging to meet their businesss technology demands, splitting the duties and allowing each leader to focus on a specific aspect of those demands increases efficiencies and gives tech leaders time to innovate. Together, the two roles oversee the companys technology strategy, including growth, infrastructure, risk management, and AI innovation and implementation, among many other aspects of the business.Related:Optimism AboundsThe year ahead will undoubtedly include its fair share of unforeseen challenges and continued stress and anxiety as organizations around the globe determine how to make the most of AI. While its a stressful time to be a tech leader, CIOs, and other tech leaders are excited about the current pace of innovation and the seemingly endless possibilities.As we look forward to 2025, its safe to say AI will continue to excite, confound, and ignite the creative fire in business leaders everywhere. Enterprises, and in particular CIOs, would do well to prepare now by starting to retrain their current workforce, launching recruitment campaigns, and preparing the C-Suite for the inevitable changes ahead.About the AuthorJean-Philippe AvelangeCIO, ExpereoJean-Philippe Avelange has been chief information officer at Expereo since 2017, following an IT Telecoms career in cloud computing, internet, telecom or e-commerce industries. He started with Capgemini Telecom and Media in 2000 before co-founding Inoven, a consulting firm with a focus on bridging the gap between business and technologies. Building the company from five co-founders to 40 consultants in 2010, he then became an independent consultant advising businesses on cloud solutions, digital transformation and agile methodologies and is experienced in helping customers deal with complex information systems architecture across multiple technologies.See more from Jean-Philippe AvelangeNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Commentaires ·0 Parts ·36 Vue
  • Realiste: Chief Operating Officer, Realiste AI
    weworkremotely.com
    Realiste is Hiring a COO!Realiste is growing, and were looking for a COO with a proven track record in building and scaling real estate agencies.We seek a professional with deep industry expertise who has successfully established and managed agencies. Strong leadership, strategic thinking, and a results-driven mindset are essential.Key responsibilities:- Develop and execute strategies for growth and efficiency.- Build and lead high-performing teams with a strong culture.- Optimize operations to enhance productivity and profitability.- Expand market presence through innovation and partnerships.If you have relevant experience and are ready to drive success, lets connect!Write here if you're interested:https://t.me/RealisteHRApply NowLet's start your dream job Apply now
    0 Commentaires ·0 Parts ·38 Vue
  • The AI Hype Index: Falling in love with chatbots, understanding babies, and the Pentagons kill list
    www.technologyreview.com
    Separating AI reality from hyped-up fiction isnt always easy. Thats why weve created the AI Hype Indexa simple, at-a-glance summary of everything you need to know about the state of the industry. The past few months have demonstrated how AI can bring us together. Meta released a model that can translate speech from more than 100 languages, and people across the world are finding solace, assistance, and even romance with chatbots. However, its also abundantly clear how the technology is dividing usfor example, the Pentagon is using AI to detect humans on its kill list. Elsewhere, the changes Mark Zuckerberg has made to his social media companys guidelines mean that hate speech is likely to become far more prevalent on our timelines.
    0 Commentaires ·0 Parts ·37 Vue
  • Residential schemes dominate RIBA South West and Wessex Awards shortlist
    www.bdonline.co.uk
    AHMM also scores fifth regional awards nomination for Bristol office projectFerry House by AR Design StudioSource: Martin GardnerTwo-Family House by Rundell AssociatesSource: Tristan StockerOne Portwall Square by Allford Hall Monaghan MorrisSource: Timothy Soar PhotographyHazelmead, Bridport Cohousing by Barefoot ArchitectsSource: Rebecca NoakesThe Cowshed by Design StoreySource: Lawrence GriggShire End West by rak architectureSource: Patricia RaynerMelville by Gillespie Yunnie ArchitectsSource: Richard Downer PhotographyThe Story of Emily by Stonewood DesignSource: FotohausThe Story of Emily by Stonewood DesignSource: FotohausThe Story of Emily by Stonewood DesignSource: FotohausThe Tin Barn by Arbor ArchitectsSource: Ellen HancockThe Tin Barn by Arbor ArchitectsSource: Ellen HancockStudio Cottage by Ashton ArchitectureSource: Agnese SanvitoWye House by Hall + Bednarczyk ArchitectsSource: Simon MaxwellA House of Wood Shingle by Forgeworks ArchitectsSource: French + TyeThe Orchards by Prewett Bizley ArchitectsSource: Prewett Bizley Architects1/16show captionResidential schemes dominate this years shortlist for the RIBA South West and Wessex Awards, accounting for nine of 13 shortlisted projects.The list includes several private homes, including contemporary extensions to derelict barns and other historic structures, along withone of the UKs largest cohousing developments, by Barefoot Architects.AHMM has scored its fifth RIBA regional awards nomination this year for itsOne Portwall Square office scheme close to Bristol Temple Meads station.The practice has already picked up four nominations for projects in the London regional awards, including its Elizabeth Line over station development at Tottenham Court Road.RIBA South West and Wessex jury chair Rob Gregory, head of campus planning and design at the University of Bristol, said: With nine homes in contention this year, domestic architecture in the South West region remains as strong as ever.This years shortlist showcases a wide range of projects, from stand-alone new builds, to holistic transformations of existing properties, and discrete extensions.Alongside these, the jury is looking forward to visiting new workplaces, cultural venues and community housing, on a carefully choreographed journey that extends over 135 miles - from the suburbs of Bath, to the far reaches of West Cornwall.All projects shortlisted for RIBA Awards will be visited by a regional jury, and the winning projects will be announced later this spring.The winners will then be considered for several RIBA Special Awards, including the RIBA Sustainability Award and RIBA Building of the Year, before being considered for a RIBA National Award, which will be announced in summer.The shortlist for the RIBA Stirling Prize will be drawn from the RIBA National Award-winning projects and announced in September, with a winner to be announced in October.
    0 Commentaires ·0 Parts ·36 Vue
  • Dell XPS 8960 Desktop Review: Alienware in Disguise
    www.cnet.com
    Dell XPS 8960 Desktop $1,400 at Best Buy Pros Excellent gaming and office performance Tame looks Ample front I/O Quiet operation Cons Proprietary motherboard limits upgrade options No dust filtration Lackluster storage speeds for the price The XPS 8960 is a solid update to Dell's long-running XPS desktop line. It has tame looks that could blend in at an office but has optional performance upgrades that'll let it run games exceptionally well -- an Alienware in a business suit if you will. The case's tight confines might seem like they'd choke its mighty components, but it runs demanding tasks and even 4K gaming all without making too much noise or running into serious thermal throttling. The pricing is even reasonable, at least for the components included in our test unit, with a $2,549 retail price discounted as low as $2,149 during the weeks we had it. However, given Dell's use of proprietary parts and a nonstandard design (it isn't an ATX motherboard), you may be limited with future upgrade options other than buying an all-new system. That said, the Dell XPS provides a very solid starting point and still has a few aftermarket upgrades available to help get extra life out of it. Dell XPS 8960 Specs Price as reviewed $2,549Size 27 liter (6.81 x 16.81 x 14.68 in/173 x 426.9 x 372.9 mm)Motherboard Dell Custom 09M47G-A00 Z690CPU 3,400MHz Intel Core i7-14700KMemory 32GB DDR5-5600Graphics Nvidia RTX 4080 SuperStorage 1TB NVMe M.2 PCIe Gen 4 SSD (boot) (SK Hynix PC801)Networking Gigabit Ethernet, Intel Killer Wi-Fi 6E 1675i 802.11AX, Bluetooth 5.3Connections USB 2.0 (x2 rear), USB 3.2 Gen 1 Type-A (x3 front, x2 rear), USB 3.2 Gen 2 Type-C (x1 front), USB 3.2 Gen 2x2 Type-C (x1 rear), 3.5mm audio connector (x1 front, x6 rear), SD card reader (x1 front), Gigabit Ethernet, Antenna x2, HDMI (x1 on GPU), DisplayPort (x3 on GPU, x1 on motherboard I/O)Operating system Windows 11 Home Before I go on, note that new processors and graphics cards are imminent, and I expect those will eventually be available in the XPS desktop or whatever Dell decides to call it now that the XPS label is dead. This might also include a full redesign, but that's unlikely as this is a relatively new chassis.The currently available XPS has a considerable range of configurations, with the base model coming in at just $800, though packing far less firepower than our test unit. That base includes an Intel Core i5-14600 with Intel UHD Graphics 770 integrated graphics, just 8GB of single-channel memory, 512GB of storage and a 460-watt power supply. Our test configuration upgrades to a Core i7-14700K, RTX 4080 Super, 32GB of dual-channel memory, 1TB of storage and a 750-watt power supply, all of which raises the price dramatically to $2,549 There's quite a range of options between the base and our test configuration, though, including various Nvidia graphics cards. Mine wasn't even a fully maxed-out system, which could include an Intel Core i9-14900K, 64GB of memory, 4TB of storage and a 1,000-watt power supply. Optional CPU air- or liquid-cooling systems are $50 extra. Performing beyond expectations Josh Goldman/CNETGiven the components, it should be no surprise the XPS has some serious performance. Yet it is a surprise because the system has very modest ventilation, including a rather small single-fan air cooler and a beefy graphics card with limited fresh air of its own exhausting heat right up into the CPU cooling tower. The case itself has only two fans, one of which is half obstructed by the butt of the graphics card. And yet, the XPS rips. Its single-core performance is excellent, nearly keeping pace with the Core i9-14900KF, and its multicore performance isn't far off. That's all the more surprising considering that the XPS is milking all of this performance from a modestly air-cooled CPU, while the recent Core i9-14900KFs I've tested were liquid-cooled in the Alienware Aurora R16 and Lenovo Legion Tower 7i 34IRZ8. Turning to graphical performance, the XPS continues to surprise. It runs its RTX 4080 Super quite effectively, largely keeping on the tail of the Legion Tower 7i with its own RTX 4080 Super. Given the Legion has liquid cooling, more ventilation and more case fans, it's impressive how well the Dell keeps up. With 1080p gaming the XPS does well, readily offering high frame rates, but it's better suited to higher resolutions like 4K. Here it managed near 120fps averages on all our game benchmarks. It's not just enjoying short bursts of high performance either. I put it through 3DMark's Steel Nomad stress test, and it maintained consistent performance over the 20-run sequence. Simply put, the XPS isn't holding back when it's time to run fast. It even manages to pull off those speeds while maintaining rather hushed fan noise. Really, the only aspect that left anything to be desired was the storage. Dell isn't using the fastest NVMe drives available, but it is charging premium prices. With an SK Hynix Platinum P41 2TB selling for $135 to $155, I'd opt for the minimum storage from Dell and plan on after-market upgrades. An office PC hiding game-ready internals Dell/CNETThe XPS is a proper sleeper. It comes in either a dark graphite chassis or a fairly classic gray. It looks like an office computer, though if you peek through the side vents, you might see the glowing GeForce branding on the side of the graphics card and get a hint of what's really going on. In fact, popping it open, I was surprised to see a nearly identical arrangement to the Alienware Aurora R16 I tested (albeit with different configuration selections), showing just how much DNA is shared between the two lines. Aside from the plastic front panel, the XPS' case is metal. The rear has a lot of perforation that can passively let in some air while a 120mm exhaust fan pushes some out. The front of my review unit had a silver upper panel, which includes the front I/O, and a gray lower with ventilation holes. Thin slits on each side add more potential airflow. The last bit of ventilation comes from a roughly 30-square-inch rectangle of holes that lines up with the graphics card inside. It's not downright choked, but this system has a lot less potential airflow and few fans compared with most gaming PCs its size. This design may help with sound though, as it doesn't get very loud even under heavy loads. How long it manages to breathe easily is an open question. Disappointingly, the ventilation lacks any dust filtration and has plenty of areas for dust to build up. Dell offers a great selection of I/O on the front, with a full-size SD card reader, three 5Gbps USB-A ports, 10Gbps USB-C and a 3.5mm combo jack. The rear I/O takes it even further with two USB 2.0 ports, two 5Gbps USB-A ports, one 20Gbps USB-C port and six 3.5mm audio jacks. It's a shame to not see Thunderbolt or USB4, though. The graphics card includes one HDMI and three DisplayPort connections, and the motherboard adds one more DisplayPort. For networking, the XPS has a Gigabit Ethernet connector on the motherboard and two antenna connectors for its Wi-Fi 6E add-in card. Dell includes a wired Wi-Fi antenna that proved stable in my testing. Getting inside is quite easy. A latch on the rear has one thumbscrew locking it in place, but loosening the screw and pulling the latch will release the left side panel, which then lifts away. The inside of the case has a ton of additional toolless parts that release with simple latches. There are two DIMM slots for memory upgrades and two easily accessible M.2 slots. The case also includes two 3.5mm hard drive cages at the top and has wires running up to them, simplifying the process of adding this storage. Beyond this, further modifications may be hard. Dell uses a custom motherboard, doesn't have special cable routing channels and appears to use many proprietary parts. A future graphics card or networking card swap may be possible, but it will likely be a little difficult and space-constrained. If you hope to keep the case and make a future platform upgrade, like swapping the motherboard and CPU, you'll likely be out of luck. While this is likely the last desktop to bear the XPS name, I hope the spirit of the XPS 8960 will continue. If you're looking for a quiet, high-powered PC without the usual gaming PC flash, though, the XPS is that sleeper.Geekbench 6 (single-core) Alienware Aurora R16 3092Lenovo Legion Tower 7i Gen 8 34IRZ8 3062Dell XPS 8960 2948Minisforum AtomMan G7 Ti 2833HP Omen 35L 2656Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 2427Lenovo LOQ Tower 17IRR9 (90WY0000US) 2273 Note: Longer bars indicate better performance Geekbench 6 (multi-core) Alienware Aurora R16 19924Lenovo Legion Tower 7i Gen 8 34IRZ8 18735Dell XPS 8960 18699Minisforum AtomMan G7 Ti 16959HP Omen 35L 12745Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 12091Lenovo LOQ Tower 17IRR9 (90WY0000US) 9947 Note: Longer bars indicate better performance Cinebench 2024 GPU Dell XPS 8960 27034Lenovo Legion Tower 7i Gen 8 34IRZ8 26537HP Omen 35L 25725Alienware Aurora R16 18063Minisforum AtomMan G7 Ti 11444Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 10474Lenovo LOQ Tower 17IRR9 (90WY0000US) 10038 Note: Longer bars indicate better performance Cinebench 2024 CPU (multi-core) Lenovo Legion Tower 7i Gen 8 34IRZ8 1896Alienware Aurora R16 1806Dell XPS 8960 1554Minisforum AtomMan G7 Ti 1431HP Omen 35L 961Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 783Lenovo LOQ Tower 17IRR9 (90WY0000US) 749 Note: Longer bars indicate better performance 3DMark Steel Nomad Lenovo Legion Tower 7i Gen 8 34IRZ8 6636HP Omen 35L 6445Dell XPS 8960 5239Alienware Aurora R16 3659Minisforum AtomMan G7 Ti 2878Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 2366Lenovo LOQ Tower 17IRR9 (90WY0000US) 2335 Note: Longer bars indicate better performance 3DMark Fire Strike Ultra Lenovo Legion Tower 7i Gen 8 34IRZ8 17565Dell XPS 8960 17525HP Omen 35L 16426Alienware Aurora R16 9927Minisforum AtomMan G7 Ti 7277Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 6232Lenovo LOQ Tower 17IRR9 (90WY0000US) 6007 Note: Longer bars indicate better performance PCMark 10 Pro Edition Alienware Aurora R16 9778Lenovo Legion Tower 7i Gen 8 34IRZ8 9720Dell XPS 8960 9539HP Omen 35L 8732Minisforum AtomMan G7 Ti 8533Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 8128Lenovo LOQ Tower 17IRR9 (90WY0000US) 7531 Note: Longer bars indicate better performance Guardians of the Galaxy (High @1920 x 1080) Alienware Aurora R16 219Dell XPS 8960 213Lenovo Legion Tower 7i Gen 8 34IRZ8 207Minisforum AtomMan G7 Ti 184HP Omen 35L 146Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 144Lenovo LOQ Tower 17IRR9 (90WY0000US) 129 Note: Longer bars indicate better performance The Riftbreaker GPU @1920 x 1080 Lenovo Legion Tower 7i Gen 8 34IRZ8 560Dell XPS 8960 550HP Omen 35L 523Alienware Aurora R16 354Minisforum AtomMan G7 Ti 269Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 243Lenovo LOQ Tower 17IRR9 (90WY0000US) 235 Note: Longer bars indicate better performance Shadow of the Tomb Raider (Highest @ 1920 x 1080) Lenovo Legion Tower 7i Gen 8 34IRZ8 255Dell XPS 8960 250Alienware Aurora R16 226Minisforum AtomMan G7 Ti 174HP Omen 35L 174Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 148Lenovo LOQ Tower 17IRR9 (90WY0000US) 142 Note: Longer bars indicate better performance 3DMark Port Royal Dell XPS 8960 18402Lenovo Legion Tower 7i Gen 8 34IRZ8 18139HP Omen 35L 17936Alienware Aurora R16 10736Minisforum AtomMan G7 Ti 7868Lenovo Legion Tower 5i 26IRB8 (90UT001AUS) 6186Lenovo LOQ Tower 17IRR9 (90WY0000US) 5985 Note: Longer bars indicate better performance Systems configurations Lenovo LOQ Tower 17IRR9 (90WY0000US) Microsoft Windows 11 Home; 2.5GHz Intel Core i5-144400F; 16GB DDR5 RAM; 8GB Nvidia RTX 4060 graphics; 1TB SSDDell XPS 8960 Microsoft Windows 11 Home;3.4GHz Intel Core i7-14700K; 32GB DDR5 RAM; 16GB Nvidia RTX 4080 Super graphics; 1TB SSDMinisforum AtomMan G7 Ti Microsoft Windows 11 Home; 2.2GHz Intel Core i9-14900HX; 32GB DDR5 5,600MHz RAM; 8GB Nvidia RTX 4070 graphics; 1TB SSDHP Omen 35L Microsoft Windows 11 Pro; 4.2GHz AMD Ryzen 7 8700G; 64GB DDR5 3,600MHz; 16GB Nvidia RTX 4080 Super graphics; 2TB SSD + 1TB SSDLenovo Legion Tower 7i Gen 8 34IRZ8 Microsoft Windows11 Home; 3.2GHz Intel Core i9-14900KF; 32GB DDR5 4,400MHz RAM; 16GB Nvidia RTX 4080 Super graphics; 1TB SSDLenovo Legion Tower 5i 26IRB8 (90UT001AUS) Microsoft Windows 11 Home; 2.5GHz Intel Core i5-144400F; 16GB DDR5 5,600MHz RAM; 8GB Nvidia RTX 4060 graphics; 1TB SSDAlienware Aurora R16 Microsoft Windows Pro; 3.2GHz; 3.2GHz Intel Core i9-14900KF; 32GB DDR5 5,600MHz RAM; 12GB Nvidia RTX 4070 graphics; 1TB SSD
    0 Commentaires ·0 Parts ·39 Vue