-
- EXPLORER
-
-
-
-
ECT News Network delivers e-commerce and technology news, reviews, and analyses on The E-Commerce Times, TechNewsWorld, CRM Buyer, and LinuxInsider. Stay informed by subscribing to our newsletters: https://www.ectnews.com/about/newsletters
Mises à jour récentes
-
WWW.TECHNEWSWORLD.COMGoogle AI Overviews Hurting Click-Through Rates: StudiesGoogle AI Overviews Hurting Click-Through Rates: Studies By John P. Mello Jr. April 23, 2025 5:00 AM PT Studies show Google's AI Overviews reduce clicks to websites by answering queries directly, raising concerns over traffic and visibility. ADVERTISEMENT Proven Tactics to Scale SMB Software Companies in Competitive Markets Gain market share, boost customer acquisition, and improve operational strength. Get the SMB Software Playbook for Expansion & Growth now -- essential reading for growing tech firms. Free Download. Two studies released last week indicate that Google’s AI Overviews are having a negative impact on click-through rates from online searches, which could ultimately reduce traffic to original sources and affect the quality of content on the internet. An analysis of 300,000 keywords by Xibeijia Guan, a data scientist at SEO tool provider Ahrefs, found that the presence of an AI Overview in search results correlated to a 34.5% lower average click-through rate (CTR) for the top-ranking page compared to keywords without an Overview. “This isn’t surprising. I have seen anecdata suggesting that some websites have seen clicks reduce by 20% to 40% since the rollout of AI overviews,” Ryan Law wrote in an Ahrefs blog on April 17. He explained that AI Overviews function in a similar way to Featured Snippets. They try to resolve the searcher’s query directly, which likely contributes to more zero-click searches. “And although AI Overviews often contain citation links, there can be many of these links cited, making it less likely for any single link to earn the lion’s share of clicks,” he wrote. “Assuming AI Overviews stay in this current form, this is also likely the highest the CTR will be. As the novelty wears off and the law of shitty click-throughs kicks in, I would expect to see clicks reduce further,” he noted. Brand Queries See CTR Lift Meanwhile, in a study of 700,000 keywords, performance agency Amsive found keywords that triggered an Overview had an average click-through decline of 15.49%. The study also noted that while only a small percentage (4.79%) of branded keywords generated an Overview, those that did had an average click-through rate increase of 18.68%. By contrast, non-branded keywords that generated an Overview had an average click-through rate drop of 19.98%. “It’s no surprise that branded keywords are getting more clicks than non-branded keywords,” said Greg Sterling, co-founder of Near Media, a market research firm in San Francisco. “The vast majority of AI Overviews trigger when the user does an ‘informational’ search — people looking for general information,” he told TechNewsWorld. “When somebody uses a branded keyword, there’s a higher degree of intent and thus a higher CTR. There’s nothing new in this.” Ben James, founder of 404, Bittensor Subnet 17, an online 3D content creation company, explained that non-branded keywords typically drive discovery and surface diverse viewpoints. “If AI Overviews are disproportionately reducing CTR for those terms, it reinforces concerns that Overviews consolidate traffic around known brands or Google’s own properties — shrinking the opportunity space for independent publishers and startups,” he told TechNewsWorld. However, the researchers’ findings seemed nonintuitive to JD Harriman, a partner at the Foundation Law Group in Burbank, Calif. “It is not clear what searchers are doing when they see an AI Overview of a branded word,” he told TechNewsWorld. “It is likely that the searcher wanted to get to the branded site in the first place, and goes ahead and clicks through, possibly ignoring the content of the Overview and just getting where they wanted to be anyway.” Fewer but Higher Quality Clicks? “There have been several studies done by different companies that show the same thing, so this was not a surprise to me at all,” said Chris Ferris, senior vice president of digital strategy at Pierpont Communications, a public relations agency in Houston. “When AI overviews are present on search engine results pages, the click-through rate for the organic stuff falls anywhere from 35% to 70%,” he told TechNewsWorld. “This makes sense because Google has been increasingly stuffing stuff at the top of their results pages, which is pushing down the organic results, which means fewer people see them, which is depressing the click-through rate,” he explained. While click-through rates might decline on pages with Overviews, Google contends that the quality of the clicks on the page improves. “We see the clicks are of higher quality because they’re not clicking on a web page, realizing it wasn’t what they want and immediately bailing. So, they spend more time on those sites,” Head of Google Search Elizabeth Reid told the Financial Times in an interview published April 14. “The studies don’t directly disprove Google’s claim about ‘high-quality clicks,’ but they show that AI Overviews likely reduce visibility and traffic for many sites, especially on non-branded, informational queries,” said Danny Goodwin, editorial director of Search Engine Land & SMX, a digital marketing and advertising technology publication. Goodwin pointed out some deficiencies in the studies. “Neither study examined whether the pages cited in AI Overviews got more clicks than they would have in a traditional search listing,” he told TechNewsWorld. He added that Google’s concept of “high-quality clicks” is vague and unverifiable outside of Google itself. A Google spokesperson was not immediately available to comment on this story. Antitrust Red Flags For some tech watchers, the studies’ results reinforce the notion that Overviews are harmful to quality content on the web. “By answering specific queries within the search interface, AI Overviews reduce the incentive to click through to original sources, diminishing traffic and weakening the feedback loop that sustains quality content creation,” said Mark N. Vena, president and principal analyst at SmartTech Research in Las Vegas. “If original content creators lose traffic, and I do fear this, monetization becomes harder, which may lower the quantity and quality of web content,” he told TechNewsWorld. “Long-term, this could degrade the richness of information available on the open web and increase dependence on platform-controlled summaries.” Rob Enderle, president and principal analyst with the Enderle Group, an advisory services firm in Bend, Ore., added that it’s intuitively obvious why Overviews will reduce the quality of web content. “Few people who buy CliffNotes read the source material because the notes fulfill the core needs of getting the gist of the content,” he told TechNewsWorld. “In reports, most only read the executive summary, as well. If you don’t need to review the full detail, why bother unless you have a unique need for a deeper understanding?” Study findings on the impact of Overviews on website traffic could play a role in antitrust actions against Google. “Google has been under scrutiny for a while now for self-preferencing its own products and services in search,” Goodwin said. “AI Overviews are another big and bold example of Google preferencing itself, many times at the expense of content creators.” “I, and many others, would love to see actual data about how much traffic Google is actually taking for itself via AI Overviews compared to the open web,” he noted. Sterling agreed. “I do think that AI Overviews will have an impact on antitrust considerations,” he said. “AI Overviews can be seen as a form of Google self-preferencing, which will create problems for Google in Europe under the Digital Markets Act. In the U.S., the decline of clicks will reinforce perceptions of Google as a monopolist hoarding traffic.” AI Overviews Reflect Market Pressure However, Jennifer Huddleston, a technology policy research fellow at the Cato Institute, a Washington, D.C. think tank, argued that companies, including Google, continue to innovate to respond to changing consumer expectations and demands, including better ways to display search content such as AI Overviews. “The use of AI Overviews illustrates how AI is changing the nature of search, and consumers may be increasingly expecting more generative AI-type results to their queries,” she told TechNewsWorld. “While the court rejected the emergence of AI as changing the market in this case,” she noted, “the continued improvements of the product indicate how the company must respond to pressures from other market leaders and consumers, a behavior that would not be necessary in a true monopoly situation.” John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Search Tech0 Commentaires 0 Parts 24 VueConnectez-vous pour aimer, partager et commenter!
-
WWW.TECHNEWSWORLD.COMAI, Layoffs Fuel Surge in Job ScamsAI, Layoffs Fuel Surge in Job Scams By John P. Mello Jr. April 22, 2025 5:00 AM PT ADVERTISEMENT Proven Customer Acquisition Strategies for SMB Software Firms Discover proven tactics for scaling products, winning customers, and staying ahead. Get your free copy of the SMB Software Playbook for Expansion & Growth. Download Today. The times couldn’t be better for job scammers. Layoffs in the tech and public sectors, coupled with the malicious use of artificial intelligence, are fueling strong growth in fraud aimed at job seekers. Scams aimed at job seekers can come in a variety of forms, among them: Hire and Fire Scams — where a job seeker is quickly hired, works, and is fired before collecting a paycheck. Fake Recruiters — where a fraudster harvests sensitive information from a job seeker as part of the application process. Pay-to-Work Offers — where job seekers are told they’ve been hired, but they have to first make some upfront payments for training or equipment. “Asking for money or asking you to purchase something with the promise of a reimbursement is a scam that has been around for a long time,” said Julia Toothacre, chief career strategist at Resume Templates. “These are companies that appear legitimate and sometimes even have a website, but their purpose is to scam people out of money,” she told TechNewsWorld. “Job seekers need to be on their toes when it comes to scams,” she added. “If it feels too good to be true, it probably is.” Robust Scam Economy Growth in job scams isn’t surprising since scam activity has been generally growing globally. “The scam economy is blowing up. In some parts of the world, it’s up 3000% year-over-year,” declared Joshua McKenty, CEO and co-founder of Polyguard, provider of a solution for defending against deepfakes and AI fraud, in New York City. Job seekers in volatile labor markets will attract scammers, he continued. “When we’ve seen big waves of layoffs in tech, especially, then scamming for workers becomes really attractive because there are lots of job seekers to target,” he told TechNewsWorld. “The same is true when hiring starts to pick up again,” he said. “A lot of hiring means a lot of targets.” He explained that AI is also contributing to job scam growth. “All of the scam economy is powered by AI right now — everything from effortless translation to scam texts, emails, and job postings that all look legitimate.” AI helps scammers pass the “smell test,” added Joshua Planos, vice president of marketing at the Better Business Bureau in Lincoln, Neb. “For a scammer, that is the ultimate goal — to give off the impression that what you are providing is real,” he told TechNewsWorld. “It stands to reason that with how much AI and chatbots are being used for everything from marketing materials to internal documents, it would have an impact on employment or job market scams,” he said. Why Job Seekers Are Prime Scam Targets Scam growth is also being driven by vulnerable job seekers, added Erich Kron, a security awareness advocate at KnowBe4, a security awareness training provider in Clearwater, Fla. “An unstable world economy has created a level of concern for many people, especially when it comes to their employment and personal finances,” he told TechNewsWorld. “This uncertainty has people who would otherwise not be interested in other employment considering their options,” he continued. “Bad actors know this, and they leverage that fear and uncertainty to meet their goals.” “A fragile labor market and desperation have created the perfect storm,” added Sam Wright, head of partnerships and operations at Huntr, an online AI-powered resume builder and job search platform. “Many job seekers apply to dozens of listings a week with little feedback, so when something promising appears, they jump,” he told TechNewsWorld. AI can contribute to that fear and uncertainty, too. “Many individuals have concerns about AI replacing their roles, so they are more open to possible career changes than in the past,” Kron said. “This concern about career obsolescence is also a tool exploited by bad actors.” New Workers Targeted by AI-Powered Scams The ease of being able to post on multiple platforms, the ability to use AI to create legitimate-looking job posts, the growth in remote work, and the sensitive data shared in job scams have all fueled their growth, noted Mona Terry, chief operating officer and head of victim services at the Identity Theft Resource Center, in San Diego, a nonprofit organization devoted to minimizing risk and mitigating the impact of identity compromise and crime. Scammers are also taking advantage of job-seeking newbies. “Many individuals are looking for remote work, and for those who have not worked remotely before, or those new to the job market after having been employed for a number of years, the interview process may be new,” Terry told TechNewsWorld. “Asking for interviews on nontraditional platforms is a red flag for those in the know, but not for the average person,” she explained. “Scammers ask for information that is traditionally asked for after hiring as proof of eligibility to work — social security numbers, driver’s license, bank account numbers for direct deposit, etc. — before hiring.” Dean Boerner, a data scientist with Revelio Labs, a workforce intelligence company in New York City, noted that one reason fake job postings and phishing emails work is the vast and growing number of job postings on the internet and job seekers’ inability to sufficiently vet all those that might be of interest to them. “Just to give you an idea of the scale here, at any given time, hundreds of millions of open job postings are represented in our data, and these vary in terms of their likelihood of leading to an actual hire,” he told TechNewsWorld. “While not really a scam, the prevalence of ghost job postings contributes to the apparent multitude of opportunities, and these have proliferated as economic uncertainty has grown,” he said. “For instance, we’ve seen the ratio of hires per job postings fall from about 0.75 to below 0.5 in recent years. Part of this is also from a shortage of talent employers deem as truly qualified, and some of it may be from companies wanting to present as growing without actually growing.” How To Spot and Avoid Employment Scams For job seekers who wish to protect themselves from scammers, Diana Rothfuss, global solutions strategy director for risk, fraud and compliance at SAS, an analytics and artificial intelligence software company, in Cary, N.C. recommends that promising positions posted on a job board be cross-referenced on the company’s website to vet their legitimacy. “Only apply for jobs via the company’s website,” she told TechNewsWorld. “Very often, the scammer’s end goal is to collect sensitive personal information that can be used to commit other frauds, including identity theft.” “Don’t click the link in the job posting,” she warned. “Open the company’s website in another browser to ensure you haven’t been directed to a phishing site.” Beware of urgency, cautioned John Wilson, a senior fellow for threat research at Fortra, a cybersecurity services company in Eden Prairie, Minn. “While some jobs may be urgently needing a candidate, no legitimate company will hire anyone who has not been background checked — they can get in legal trouble — and this takes time,” he told TechNewsWorld. “Whenever you feel pressured to act quickly, slow down and check things out,” he said. “Urgency is a known persuasion technique used to influence people.” The best way to avoid these scams is to be cautious with unsolicited job offers, advised Paul Farnsworth, president of Dice, a career website for technology and engineering professionals in Centennial, Colo. “Always research the company thoroughly, be wary of any job that asks you to pay a fee upfront, and steer clear of any offers or setups that seem too good to be true,” he told TechNewsWorld. “Don’t forget the classic phishing red flags: double-check inconsistencies in email address domains, don’t share sensitive personal info, and look out for anything suspicious.” “With AI getting smarter, an uncertain economy, and the fact that these scams are low-risk and potentially high-reward for the people running them, chances are they’ll perpetuate and grow,” he said. John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Cybersecurity0 Commentaires 0 Parts 32 Vue
-
WWW.TECHNEWSWORLD.COMAMD’s Embedded Edge: Leadership, Differentiation, and AI OpportunityOver the last decade, AMD has undergone a remarkable transformation. From a company once struggling for relevance, it has risen under CEO Lisa Su’s steady and strategic leadership to become a serious contender across the data center, client computing, and now embedded and adaptive edge markets. One of AMD’s fastest-rising stars is its embedded business, now armed with a broad portfolio and a sharp focus on AI. As competitors like Intel falter, AMD’s differentiated approach could put it on a trajectory to gain significant market share, particularly at the embedded edge. AMD’s Embedded Rebound and Push Into Edge AI AMD’s acquisition of Xilinx laid the foundation for its embedded success. This purchase brought a robust adaptive computing portfolio — FPGAs, SoCs, and RF technologies — that AMD has tightly integrated with its x86 CPUs, GPUs, and NPUs. In an invite-only fireside chat with analysts last week, Salil Raje, SVP and GM of AMD’s Adaptive and Embedded Computing Group, the depth of that integration was on full display. Raje outlined AMD’s five-pillar strategy: Fortifying its adaptive portfolio Improving usability for developers Growing x86 embedded market share Winning high-value custom silicon deals Leading in embedded AI AMD isn’t just positioning itself as a component vendor — it’s becoming a “platform enabler” across industries like automotive, aerospace, communications, and robotics. AMD’s Edge Over Intel in Embedded Strategy It’s clear that AMD is not playing catch-up — it’s pushing ahead where others stall. AMD has achieved revenue leadership in adaptive computing, leaving Intel’s Altera (soon to be spun out again) in its wake. In embedded CPUs, AMD holds just a 7%-8% market share but sees that as an opportunity, not a weakness. Raje said, “We believe we can grow significantly faster in that business over the next four to five years.” What makes AMD’s approach stand out? Flexibility and openness. AMD’s edge strategy doesn’t depend on any single compute architecture. Instead, it uses a modular mix of x86, Arm, GPU, and FPGA — whatever the application demands. The company also avoids a black-box approach to AI software stacks, instead partnering with ecosystem players to keep platforms open and customizable. This open strategy contrasts sharply with more closed approaches from some of its competitors, particularly in automotive and robotics. AI at the Edge: AMD’s Next Big Move Perhaps the most exciting element of AMD’s embedded strategy is its continued aggressive push into edge AI. “There will be a ChatGPT moment at the edge,” said Raje, and AMD wants to be ready for it. AMD is integrating NPUs into nearly every product, from AI PCs to embedded SoCs. The goal is simple: deliver low-latency, power-efficient AI acceleration in markets like industrial automation, medical imaging, and autonomous vehicles. AMD’s recent product launches reflect this vision. From the versatile Versal AI Edge Gen 2 — which fuses ARM cores, FPGA fabric, ISPs, and NPUs — to the powerful EPYC Turing 9005 with 192 Zen 5 cores, the company is scaling across performance tiers and verticals. It’s already winning sockets in security, networking, and auto sectors. Moreover, AMD’s AI software tools enable seamless migration from cloud-trained models to edge deployments, a unique value proposition that strengthens customer loyalty. Custom Silicon: Playing Offense, Not Defense AMD’s edge isn’t just in off-the-shelf products. Its custom silicon business, once limited to gaming consoles, is gaining traction across automotive, defense, and data center sectors. Importantly, AMD doesn’t pursue custom silicon unless it brings differentiated IP or platform value, such as integrating x86, GPU, or RF IP into unique packages. It’s a targeted, value-driven strategy that avoids commoditization. Chiplets add another layer of flexibility. AMD’s leadership in chiplet architectures allows it to offer semi-custom solutions more cost-effectively, integrating customer IP on shared platforms. As chiplet adoption increases, AMD’s ability to modularize compute elements will become a powerful differentiator. Leadership That Delivers Much of AMD’s rise can be traced back to the discipline and strategic clarity of CEO Lisa Su. Her turnaround of the company isn’t a product of bold promises but of measured execution that prioritizes innovation, product roadmaps, and market focus. That same DNA is evident in AMD’s embedded and adaptive computing. Su’s leadership enabled AMD to avoid the pitfalls that have plagued Intel — missed process nodes, delays in AI strategy, and an overdependence on legacy business lines. AMD, by contrast, now delivers products that are often competitive but ahead of the curve, particularly in power-performance ratios and time-to-market in AI. The Intel Factor: A Window of Opportunity Intel’s struggles in recent years have opened the door for AMD. From manufacturing delays to uncertainty around the Altera spinout, Intel’s position in the embedded market is vulnerable. While Intel still dominates in x86 embedded CPUs, its distracted execution allows AMD to grab market share, especially with AI reshaping workloads at the edge. AMD’s strength in heterogenous computing, openness to Arm, and software-developer focus make it far more agile in responding to evolving edge AI needs than Intel’s more rigid portfolio. If AMD executes on its roadmap and continues to differentiate with a modular platform approach, it could become the go-to supplier for a broad swath of edge workloads. A Platform for the Future AMD’s embedded business is no longer just a side bet. It’s rapidly becoming a cornerstone of the company’s long-term growth strategy. Once viewed as a niche, the embedded market is now a critical front in the broader computing landscape, especially as AI workloads migrate from centralized data centers to distributed, real-time environments at the edge. Under Lisa Su’s direction, AMD’s leadership team has positioned the company to capitalize on this shift with discipline, clarity, and a sharp focus on execution. The strategy is not just about having a broad portfolio but about how it works together. AMD is offering customers a consistent, scalable compute platform from cloud to edge, blending the flexibility of adaptive hardware with the performance of CPUs, GPUs, and NPUs. This point is especially relevant in today’s fragmented edge environments, where power efficiency, latency, and customization define competitive advantage. AMD’s modular approach, enabled by chiplets and customizable silicon, ensures customers can get precisely what they need without compromise. AMD’s Opportunity To Redefine Embedded Computing The company’s solid stance on open software ecosystems resonates in markets that have grown weary of closed, proprietary solutions. This customer-centric approach and a differentiated product roadmap make AMD more than a component supplier: it’s becoming a strategic partner across industries. As Intel contends with a new CEO, internal restructuring, and struggles to execute cleanly in the embedded and AI domains, AMD has a rare and meaningful opportunity to gain market share and mindshare. Already, the momentum is evident: new design wins, expanding market share in adaptive and embedded CPUs, and deepening traction in custom silicon engagements. The path ahead won’t be without challenges. Arm-based players, vertical integration trends, and software complexity will continue to test all major players, but AMD appears better prepared and positioned than ever. It’s clear that AMD is not just catching up; it’s redefining the rules of the embedded game. If it continues to execute with the same precision that defines its turnaround story, AMD won’t just lead in AI at the edge but will help determine what the edge becomes. What a remarkable juxtaposition AMD’s position in the semiconductor industry is today compared to just 10 years ago.0 Commentaires 0 Parts 65 Vue
-
WWW.TECHNEWSWORLD.COMThe Herculean Task of Reshoring Electronics Manufacturing to the USWhile tariffs create a clear incentive to bring manufacturing back to the U.S., this is far from an easy task. Building up the kind of manufacturing capacity the U.S. once had will take decades, as it did in China. This week, we’ll examine why it is so difficult to reverse a trend that dates back to the breakup of RCA in the 1940s — marking manufacturing as a low government priority — an issue that can’t be fixed in a few years. We’ll close with my Product of the Week, a hydrogen-powered horse robot (in prototype form) from Kawasaki named Corleo that should be far better than a motorcycle if it makes it to market. Reshoring US Manufacturing Is Difficult The call to “bring manufacturing back” resonates deeply in the American psyche, fueled by nostalgia for a perceived golden era, concerns about national security, and anxieties over global supply chain vulnerabilities. Electronics manufacturing, which encompasses everything from intricate semiconductors to consumer gadgets, is at the heart of this discussion. Yet, despite the political rhetoric and popular support, reshoring complex electronics manufacturing to the U.S. borders on impossible in the near term. The reasons are multifaceted and deeply entrenched, stemming from decades of global economic shifts, strategic investments by competitors, and fundamental differences in infrastructure, workforce, and policy environments. Why China Still Leads Electronics Manufacturing China methodically built itself into the world’s workshop for decades, particularly for electronics. This dominance wasn’t accidental; it resulted from strategic planning and the cultivation of several key advantages that the U.S. currently cannot match. Labor Dynamics and Scale While often cited, the simple “cheap labor” argument is now oversimplified, though it was the initial catalyst. Chinese labor costs have risen significantly. However, the sheer scale of the available workforce, coupled with decades of experience, specifically in electronics assembly and production processes, creates efficiency and flexibility that is difficult to replicate. More importantly, this vast labor pool allowed for the creation of manufacturing ecosystems on a scale unseen elsewhere. Foxconn City in Shenzhen, employing hundreds of thousands of workers in a single integrated campus, exemplifies this scale. It’s a model with no parallel in the U.S. Even as automation increases, the existing skilled and semi-skilled labor base provides a foundation and adaptability critical for the rapid product cycles common in electronics. Purpose-Built Infrastructure China didn’t just attract factories; it built the entire logistical ecosystem to support them. This infrastructure includes massive, modern ports optimized for container shipping, extensive high-speed rail networks for domestic component transport, dedicated manufacturing zones with reliable utilities, and dense clusters of suppliers. Component manufacturers, mold makers, testing facilities, and assembly plants often exist in close geographic proximity, enabling rapid iteration, troubleshooting, and production scaling — a robust supply chain ecosystem. While extensive, the U.S. infrastructure is geared mainly toward consumer logistics and lacks the hyper-specialized, manufacturing-centric density found in regions like the Pearl River Delta or the Yangtze River Delta. Recreating such an integrated infrastructure in the U.S. would require decades and astronomical investment. Robotics and Automation Adoption Counterintuitively, China is also a leader in manufacturing automation. Facing rising labor costs and striving for higher precision, Chinese manufacturers, often aided by government initiatives, have invested heavily in robotics and advanced manufacturing technologies, rapidly increasing their robot density. They possess the scale for manual assembly when needed and increasingly sophisticated automated lines for high-volume, high-precision tasks. This combination of flexible manual labor capacity and advanced high-precision automation enables Chinese firms to stay competitive across a wide range of manufacturing complexities. While the U.S. has advanced automation capabilities, the scale of deployment within integrated electronics ecosystems lags behind China. Aggressive Government Financial Support The Chinese government has treated the development of its manufacturing sector, especially in strategic areas like electronics, as a national priority. To support this goal, it has provided massive, sustained financial support through various mechanisms: direct subsidies to manufacturers, low-interest loans from state-owned banks, tax incentives, government funding for research and development, land grants, and, sometimes, less tangible benefits like expedited regulatory approvals. This coordinated, long-term state backing created an environment where companies could invest heavily in capacity and technology with reduced financial risk, fostering the sector’s rapid growth. Organizations like the IMF have analyzed this approach as having significant trade implications. Decades-Long Hollowing Out of U.S. Manufacturing The rise of China’s manufacturing prowess coincided with a decades-long decline in U.S. manufacturing capacity, particularly in electronics assembly and component production — excluding some high-end areas like advanced semiconductor design. This wasn’t a sudden collapse but a slow bleed driven by corporations seeking lower production costs and focusing on design, marketing, and software — the higher-margin ends of the value chain. The consequences are profound. Factories closed, equipment was sold off or scrapped, and crucially, entire generations of skilled manufacturing workers retired or moved into other sectors. The intricate networks of specialized suppliers that support complex manufacturing dwindled. Institutional knowledge — the practical expertise in running complex production lines, managing supply chains, and training technicians eroded. Rebuilding this isn’t just about constructing buildings; it’s about resurrecting an entire industrial ecosystem, complete with its human capital and specialized knowledge base. As analysis suggests, millions of jobs were lost over decades. If it took decades to dismantle, it stands to reason that it will take decades to rebuild, assuming the will and resources are consistently available. Immense Hurdles of Rebuilding: Time, Investment, and Policy Even if the U.S. were to embark on a serious reshoring effort, the practical challenges are staggering. Building Takes Time Constructing a large-scale, state-of-the-art manufacturing facility, like a modern semiconductor fabrication plant (fab), is a multi-year endeavor. It involves site selection, complex permitting processes (environmental, zoning), massive construction, installation of highly specialized equipment, and rigorous calibration and testing. A single fab can take three to five years or more, from groundbreaking to full production, costing upwards of $15-$20 billion, assuming no significant delays. To make a dent in reshoring electronics, the U.S. would need not just one but dozens of such large facilities, plus countless smaller suppliers — a monumental undertaking spanning decades. Need for Long-Term, Unshakeable Incentives Building these facilities requires colossal capital investment. Companies undertaking such investments need certainty regarding the long-term economic environment to ensure a return on investment. Incentives like tax breaks or tariff relief are often discussed. However, U.S. policy, particularly regarding trade and tariffs, has proven highly volatile, creating uncertainty that disrupts predictability and discourages investment. Tariffs implemented by one administration can be altered or removed by the next or even adjusted month-to-month based on geopolitical shifts or trade negotiations. For a factory with a 10–20-year payback period, the risk that crucial incentives could disappear within a single presidential term is a major deterrent. Investors require policy stability that extends far beyond typical election cycles — something historically difficult to guarantee in the U.S. system. Without credible, long-term, and perhaps even legislatively locked-in incentives, the financial risks of massive reshoring investments are often too high for private companies to bear alone. US Lacks Skilled Labor for Electronics Work Beyond physical infrastructure and policy, there’s the human element. Skills Gap Decades of de-emphasis on manufacturing have led to a significant mismatch between the skills needed for advanced electronics manufacturing and those prevalent in the U.S. workforce. Modern electronics production requires highly skilled technicians proficient in robotics, process control, cleanroom protocols, quality assurance, specialized equipment maintenance, and engineers with deep expertise in manufacturing processes. While the U.S. excels in design and engineering, the pipeline for skilled manufacturing technicians and engineers has shrunk considerably. In contrast, China produces vastly more engineers and technicians annually, many specifically trained for manufacturing roles, although challenges remain in aligning skills with industry needs globally. Rebuilding America’s vocational and technical training systems to meet this demand will require long-term investment and a shift in educational and cultural priorities. Workforce Discrepancy There’s a stark contrast between public sentiment and individual career choices. Surveys consistently show overwhelming public support (around 80%) for bringing manufacturing back to the U.S., a sentiment that holds across party lines and contexts. Yet only 20%–25% say they would consider working in a factory. This disconnect reflects changing career aspirations, perceptions (sometimes outdated, though improving according to some studies) of factory work as monotonous or physically demanding, and the availability of jobs in the service, tech, and gig economies. Even with training programs and improving perceptions, attracting and retaining a sufficient number of workers willing to take on demanding manufacturing roles, potentially at wages that must still compete globally (even with automation), presents a significant social and economic challenge. Catching Up: The Price Tag of Reshoring China’s manufacturing dominance was built on decades of massive, state-directed investment, which created systemic advantages and sometimes led to global overcapacity issues. For the U.S. to catch up, particularly in a mature industry where China already has established economies of scale and integrated ecosystems, the required investment would likely need to be even larger and more sustained. Closing that gap isn’t just about subsidizing factory construction. While initiatives like the CHIPS Act represent important progress, they address only a portion of the broader manufacturing ecosystem. Achieving true competitiveness would require coordinated public and private investment in workforce development, infrastructure, supply chains, and advanced manufacturing capabilities. Sustaining such an effort over decades would demand a level of political consensus and fiscal commitment that is historically difficult to maintain in the U.S. Wrapping Up The desire to reshore electronics manufacturing is understandable and driven by legitimate economic and security concerns. However, the practical realities paint a picture of immense difficulty, particularly in the near term. China’s entrenched advantages in scale, infrastructure, government support, and, increasingly, automation create a formidable barrier. Decades of U.S. manufacturing decline have left deep gaps in physical capacity, supply chains, and skilled human capital. Rebuilding requires not only time — years to build individual plants and decades to reconstruct ecosystems and workforces — but also unprecedented levels of sustained investment and, critically, long-term policy stability that is antithetical to recent U.S. political history. While targeted investments in strategic niches like advanced semiconductors are possible and underway, the wholesale return of the broad electronics manufacturing ecosystem seen in Asia remains, for the foreseeable future, an aspiration facing near-insurmountable obstacles. It’s a multi-decade marathon requiring unwavering national commitment, not a sprint that can be won with short-term policies or wishful thinking. Corleo: Kawasaki’s Hydrogen-Powered Horse Robot Imagine a future where transportation isn’t limited to wheels or wings, but steps confidently over rough terrain. Kawasaki is bringing that vision closer with “Corleo,” a fascinating hydrogen-powered, rideable quadruped robot — essentially, a robotic horse unveiled for Expo 2025 Osaka. This isn’t just science fiction — it’s a glimpse into practical future applications, as seen in Kawasaki’s concept video: Why a robot horse? Think about the advantages. Real horses are incredibly sure-footed and capable of navigating landscapes that would stop most motorcycles or ATVs cold. However, they require significant upkeep — feeding, stabling, and veterinary care — while motorcycles lack that all-terrain agility. Corleo aims for the best of both worlds: the potential sure-footedness of a quadruped — similar to advancements seen in other four-legged robots — combined with the lower maintenance of a machine powered cleanly by a 150cc hydrogen engine that generates electricity for its legs. The potential applications are exciting. Corleo could be invaluable for remote rescue operations. Picture sending a team of these into disaster areas or rugged wilderness where vehicles can’t reach. If developed with autonomous capabilities, Corleo could even venture into dangerous zones alone to locate and extract individuals, minimizing risk to human rescuers. Future Possibilities for Kawasaki’s Robot Horse Beyond rescue, imagine other uses: military transport in challenging environments (effectively bringing back the cavalry, but robotic!), unique, eco-friendly tour vehicles offering silent traversal through nature parks, or even as a fascinating, low-maintenance alternative for someone wanting an exotic pet without the biological demands. What could Corleo evolve into? Perhaps faster, more agile versions, integrated with advanced AI for complex tasks or specialized models for specific industries. It represents a stepping stone toward more versatile and adaptable robotic mobility, though the current capabilities are limited compared to the concept vision. Honestly, forget the sports car — a hydrogen-powered robot horse that can traverse mountains? Now that would make an incredible birthday gift for someone adventurous (hint: my birthday is coming up). Kawasaki’s Corleo isn’t just a robot; it’s a four-legged stride into the future — and my Product of the Week.0 Commentaires 0 Parts 52 Vue
-
WWW.TECHNEWSWORLD.COMAI Raises Bigger Concerns for Students Than Teachers, Admins: StudyAs AI continues reshaping the classroom, a new multinational study reveals that students are more worried about its impact than teachers or administrators — raising fresh concerns about critical thinking, misuse, and the future of learning. The post AI Raises Bigger Concerns for Students Than Teachers, Admins: Study appeared first on TechNewsWorld.0 Commentaires 0 Parts 85 Vue
-
WWW.TECHNEWSWORLD.COMNTT’s Upgrade 2025 Event: A Showcase of Possibility Without PurposeNTT is one of the most powerful technology conglomerates in the world. As a telecommunications giant, the company operates a global network infrastructure, ranks among the top three data center providers worldwide, and employs more than 330,000 people. Through its NTT Data subsidiary, it boasts deep expertise in cybersecurity, next-gen networking, quantum research, and enterprise IT services. With these assets, NTT should be positioned as an industry-defining force in the AI-powered future. However, at its recent NTT Research Upgrade 2025 event, it chose not to lead. Instead, a bold, clear articulation of vision and ambition became a disjointed series of ideas, framed more as academic explorations than strategic imperatives. Lofty language, vague metaphors, and philosophical asides dominated the company’s core messaging. While the technology showcased was real and impressive, the leadership tone was tentative — more deferential to partners than a directive to the market. In short, NTT missed the moment, which is a strategic misstep for a company with its capabilities. Ambitious Language, Unclear Strategy NTT Executive Chairman Jun Sawada opened the keynote with expansive, almost poetic language. He spoke about “upgrading reality,” building a “network of AIs,” and promoting a “pluralistic value society.” He referenced philosophical inquiries and the creation of the Kyoto Institute of Philosophy, aiming to bring together Eastern and Western thought in shaping the future of human-AI coexistence. These are intriguing themes. However, they lacked anchoring in a keynote intended to showcase technology leadership — which turned into a couple of fireside-style chats. There was little connection to product roadmaps, customer impact, or near-term business outcomes. Sawada spoke of IOWN — the company’s ambitious, Innovative Optical and Wireless Network — but left unexplained how this infrastructure uniquely enables or differentiates NTT in the AI race. Sawada mentioned the importance of connecting AIs to build a “heterogeneous world” but stopped short of detailing what NTT is building to realize that goal. The result? The keynote felt more like a symposium on the philosophy of technology than a declaration of leadership. For NTT, whose customer base includes some of the world’s most demanding enterprise and government clients, that was a missed opportunity to inspire confidence. Research Focus Felt Like Strategic Retreat Kazu Gomi, CEO of NTT Research, doubled down on the company’s commitment to basic research. He described NTT’s Silicon Valley-based research labs and their work in applied physics, cryptography, and cardiovascular bio digital twins. To his credit, he was refreshingly candid in admitting that much of this research may not become a commercial product in the near term. Again, this level of scientific humility is understandable from a university lab. However, from a Fortune Global 100 enterprise, it comes across as strategic deferral. Gomi introduced a new concept called “Physics of AI,” which is meant to demystify how AI systems work and increase their trustworthiness. However, his description leaned heavily on metaphors, such as apples falling from trees and Newtonian physics, and lacked tangible proof points or technical framing. Yet, there was no discussion of frameworks, metrics, or deliverables. There is no sense of how this new initiative would generate a competitive advantage for NTT or its customers. There was no call to action for industry partners; it was just an abstract pitch. In a world where competitors like Microsoft, Nvidia, Amazon, and Google are integrating AI into everything from data centers to developer tools, NTT’s insistence on staying in the research phase feels like a reluctance to lead. Snowflake and NTT Data Filled the Vacuum Ironically, the most substantive content of the event came from outside NTT’s core corporate leadership. Snowflake CEO Sridhar Ramaswamy delivered a practical, compelling roadmap for enterprise AI adoption. He described how Snowflake helps clients extract value from their internal data, build AI copilots, and deploy production-grade chatbots. He emphasized trust, efficiency, and ease of deployment—core values that enterprise buyers care deeply about. NTT Data CEO Abhijit Dubey provided a similarly focused perspective. He highlighted four innovation areas: quantum computing, voice mining, attribute-based encryption, and trusted data spaces. Each was tied to real-world customer stories: BMW, Japan Post Bank, and smart city pilots. These were clear, testable use cases tied to value delivery. But therein lies the disconnect. These leaders made the case for innovation. NTT itself did not. While Snowflake and NTT Data sounded like organizations building and delivering the future, NTT Corporation remained in the background — host to a conversation it should have been driving. Failure To Connect the Dots NTT has everything it needs to be a global technology leader in the AI era: A top-tier worldwide fiber and wireless network Massive data center presence, especially in high-growth markets like India Deep talent in quantum science, cybersecurity, and encryption An enterprise customer base that spans industries and continents An IT services division (NTT Data) that is among the largest in the world But Upgrade 2025 failed to tie these assets into a coherent strategic narrative. There was no aggressive positioning of IOWN as the backbone for AI-native networking. There was no clear articulation of how NTT’s data center footprint enables sovereign AI or edge intelligence. No insight was provided into how NTT’s research labs fuel product innovation pipelines, and perhaps most surprisingly, there was no bold statement about how NTT intends to compete in an industry that is moving at unprecedented speed. NTT didn’t use its stage to declare leadership. It used it to float ideas and host guests. For a company of its size, that’s a passive stance and a missed opportunity to drive the conversation forward. The Stakes Are Higher Than Ever Enterprise buyers are not looking for abstract promises. They want trusted partners who can deliver secure, scalable AI infrastructure, integrate with their systems, and help them navigate complexity. Government clients want solutions they can control and deploy locally. Telecom and cloud operators are battling to redefine the role of connectivity in an AI-native world. NTT could lead all of these markets. It has the assets. It has the talent, and, most crucially, it has the credibility. But to compete, it must first lead with confidence and clarity. Upgrade 2025 was a chance to assert its leadership and showcase NTT’s technology, purpose, business model, and vision for where the AI-powered enterprise is going. Instead, it chose the safety of abstraction. Final Thoughts: A Stage Missed NTT doesn’t need consumer recognition. It doesn’t sell smartphones or search engines. Its impact is felt behind the scenes — where networks are built, data is stored, and enterprise systems are connected. That makes forums like Upgrade 2025 especially important. They are the rare public moments where NTT can show the market what it stands for. Unfortunately, the company didn’t do itself any favors at this year’s event. It did not strengthen its position as an unabashed thought leader. It did not clarify how its formidable portfolio of technologies, across infrastructure, research, and services, comes together to solve enterprise and societal challenges — and it certainly did not project urgency. In a market where AI adoption is now a race — not a roadmap — NTT’s hesitance to lead was palpable. The company may have world-class technology and ideas, but at Upgrade 2025, it left leadership on the table.0 Commentaires 0 Parts 98 Vue
-
WWW.TECHNEWSWORLD.COMHow Intel and Others Can Help Western Carmakers Compete With ChinaWestern automotive giants face an existential challenge as China’s carmakers surge ahead. Much of China’s edge comes from how its automotive sector is structured: streamlined, fast, and incredibly tech-forward. R&D cycles for Chinese electric vehicles (EVs) typically span just nine to 18 months. In contrast, many Western automakers require five to seven years to bring a new vehicle from concept to production. If this gap isn’t closed — and fast — the Western auto industry could become irrelevant by 2030. Let’s talk about how Intel and others could save the auto industry. Then, we’ll close with my Product of the Week: the HP EliteBook Ultra G1i 14-inch AI PC. China’s Fast-Moving Auto Sector One critical reason for China’s lead is its organizational agility. Chinese car companies operate under more linear leadership models, where decision-making is centralized and fast. There’s minimal bureaucracy, and product development teams are tightly aligned with executive leadership. In contrast, Western companies often operate under legacy structures built over decades, with siloed departments and multilayered chains of approval. These structures kill speed. In today’s hypercompetitive environment, time is everything. Why Chinese Carmakers Delay Hardware Decisions Another strategic advantage Chinese carmakers have embraced is choosing hardware last. Instead of locking in chipsets, cameras, and sensors early in development, they build vehicles on flexible, software-defined architectures. This approach allows them to integrate the most advanced technologies available at the time of launch, ensuring they’re not stuck with obsolete systems by the time the car hits the road. Western automakers still operate in reverse: they make hardware decisions early, which locks the vehicle into slower and less capable tech. That’s why you can buy a brand-new car and still be disappointed to find that the infotainment system and other tech features haven’t advanced much from what was available a decade ago. Enter Intel and the Tech Sector At this point, Intel and other tech giants could dramatically alter the trajectory of Western automotive companies. Intel has deep roots in high-speed innovation and leading technology transitions. It could provide crucial expertise in agile development practices, hardware/software integration, and modular platform design. One key area is photonics, a revolutionary technology that enables data to travel as light rather than electrical signals. Intel is among the world leaders in silicon photonics and could guide carmakers in replacing expensive, heavy, and increasingly bandwidth-constrained copper wiring with fiber-optic solutions. Photonics doesn’t only reduce weight — it drastically improves data transmission speeds, making it ideal for next-generation vehicles loaded with sensors and AI modules. Intel, AMD Partnership Could Save Western Carmakers In the early days of the PC revolution, Intel and AMD drove massive innovation by functioning as second-source partners, providing interchangeable processors that helped standardize the personal computing landscape. This model could be revived for automotive computing. Currently, Qualcomm and Nvidia dominate the automotive AI chipset space, but a renewed Intel-AMD alliance could give automakers a flexible, competitive alternative. To unlock this potential, the two firms should consider standardizing common sockets or board layouts, much like they did in the x86 era. Standardization would allow automakers to adopt a single-vehicle compute architecture and choose between Intel and AMD for different trim levels to overcome product shortages or regional variants, dramatically reducing development costs and improving sourcing resilience. In addition, both AMD and Intel are highly scalable at the socket level, allowing better upgrade paths and enabling last-minute or post-sales enhancements that could generate new revenue for dealers. AI Will Reshape the Future of the Auto Industry AI is poised to radically reshape the automotive landscape. The rise of Cars-as-a-Service (CaaS) models, autonomous vehicle fleets, and real-time predictive maintenance will fundamentally change the economics of mobility. In the future, owning a car may be less attractive, especially in urban environments. Consumers will demand smarter, more connected, and constantly improving vehicles. Automakers will need to shift from building static machines to offering dynamic, software-defined platforms. Tech companies understand this realm deeply. Firms like Intel, Google, and Amazon are already experts in cloud integration, edge processing, real-time analytics, and software monetization. By partnering with these firms, car companies can accelerate their transition to the automotive-as-a-platform model. Wrapping Up: Clock Is Ticking for Western Carmakers China isn’t just ahead in the EV race — it’s accelerating. Brands like BYD, Nio, and XPeng already deliver world-class electric vehicles at unbeatable prices. They’re expanding globally and investing heavily in autonomy and AI. Meanwhile, Western carmakers remain hamstrung by legacy supply chains, outdated software stacks, and glacial product cycles. Without bold, immediate action, many could face extinction by 2030. This is where Intel and its peers offer more than chips — they offer a lifeline. By helping legacy manufacturers reimagine their cultures, processes, and architectures, tech companies can serve as strategic partners in a much-needed reinvention. The opportunity is immense, but so is the risk. Carmakers that don’t rapidly adopt fast-cycle development, modular compute architectures, photonics, and AI-driven service models will not only lose market share — they’ll become irrelevant. If Intel, AMD, and their ecosystem allies work hand-in-hand with automakers to build next-generation vehicles, they won’t just help an industry survive — they’ll help it thrive in a world where speed, intelligence, and adaptability decide who leads and who’s left behind. HP EliteBook Ultra G1i 14-inch AI PC HP’s new EliteBook Ultra G1i 14-inch is one of the first next-generation AI PCs to hit the market. It’s tailored for professionals who value security, sustainability, and premium user experience. This sleek business laptop features Intel’s Core Ultra 5 or 7 processor, delivering a whopping 48 TOPS (tera operations per second) of AI acceleration power. This AI acceleration can improve performance by up to 2.2x for demanding tasks like video editing or webinar production. Unlike gaming laptops that sacrifice battery life for graphics performance, the EliteBook Ultra G1i is built for real-world productivity. Its lightweight design, compact charger, and extended battery life are optimized for business travel and hybrid work. Despite its slim profile, it packs surprising performance muscle. The EliteBook Ultra’s showpiece is its stunning 2.8K OLED display, available in touch and non-touch options. This high-resolution screen offers vibrant colors, deep blacks, and razor-sharp detail — ideal for professionals who value visual clarity in their daily workflow. HP EliteBook Ultra G1i 14 inch Notebook Next Gen AI PC Wolf Pro Security Edition (Image Credit: HP) Security is another area where this notebook shines. It includes HP Wolf Security, a comprehensive endpoint defense suite that provides protection at every layer of the device. It’s also certified as a Microsoft Secure Core PC, which meets the strictest requirements for firmware protection, hardware-based root-of-trust, and identity safeguards, which are ideal for handling sensitive corporate data. One of the standout additions is support for the full Poly Camera Pro experience. This camera system uses AI to improve lighting, auto-frame subjects, suppress background noise, and enhance video clarity, giving users unmatched control over how they appear in virtual meetings. For leaders and executives constantly on calls, it’s a game-changer. HP goes big on sustainability. The EliteBook Ultra is one of the most eco-conscious laptops in its class, made with recycled metals and ocean-bound plastics throughout the chassis and packaging. The laptop’s unique Atmospheric Blue finish isn’t just eye-catching — it underscores HP’s effort to move away from generic enterprise design. Ultimately, this laptop is designed with the modern leader in mind. Its next-gen AI capabilities and unmatched build quality complement its strong security foundation, efficient performance, and high-end visuals. It’s not just a work tool — it’s a statement of intent for professionals who demand the best. For anyone in search of a future-proof business notebook that marries style, substance, and sustainability, the HP EliteBook Ultra G1i 14-inch Notebook Next Generation AI PC is one of the most compelling choices available today, and it’s my Product of the Week.0 Commentaires 0 Parts 98 Vue
-
WWW.TECHNEWSWORLD.COMCollection of Private Data Makes Mobile Apps Fat Target for HackersCollection of Private Data Makes Mobile Apps Fat Target for Hackers By John P. Mello Jr. April 9, 2025 5:00 AM PT ADVERTISEMENT Proven Customer Acquisition Strategies for SMB Software Firms Discover proven tactics for scaling products, winning customers, and staying ahead. Get your free copy of the SMB Software Playbook for Expansion & Growth. Download Today. Mobile applications are quietly attracting more and more malevolent attention — and for good reason. They contain a trove of private information about their users. In the iOS universe alone, 82.78%, or about 1.55 million apps, track private user data, according to the trends tracker Exploding Topics. Mobile apps have also proven to be particularly vulnerable attack surfaces for cybercriminals. “Invisible” points of ingress and egress inside mobile apps can be compromised before legacy security tools even detect a breach. Those points include API calls, background syncing, and push notifications. Satish Swargam, principal security consultant at Black Duck Software, an application security company in Burlington, Mass., explained that a mobile user can grant permissions in mobile apps. “Most users do not diligently apply the permissions and broadly grant permissions, allowing malicious apps to exploit these invisible points,” he told TechNewsWorld. What’s more, legacy tools often don’t identify suspicious behavior until it’s too late. AI-powered fraud can bypass multi-factor authentication, exploit memory-related bugs and vulnerabilities, and hijack transactions in real time. “AI has changed the entire landscape for protecting mobile consumers, mobile transactions, mobile revenue, and mobile experiences. It’s lowered the barrier to creating attacks,” said Tom Tovar, CEO of Appdome, maker of a security and integration platform for mobile developers and enterprise professionals, in Redwood City, Calif. “I think we’ve seen a real dark renaissance around the use of AI to create attacks, enhance them, amplify them, and levy them against more and more consumers more easily than ever,” he told TechNewsWorld. “If you’re in the defense business, it’s an amazing time,” he said. “But if you’re just an average everyday consumer, it’s a pretty scary time.” “AI-powered attacks both in the real world and with mobile apps are making it easier and faster for threat actors to compromise systems,” added Chris Hills, chief security strategist at BeyondTrust, a maker of privileged account management and vulnerability management solutions in Carlsbad, Calif. “AI trained for malicious purposes can easily scan, discover, expose, and exploit flaws much more quickly than a normal human could ever,” he told TechNewsWorld. “This is why the fight to harness AI for good purposes is so important.” Mobile App Design Lacks Built-In Security Mobile apps are tempting targets for threat actors because they’re everywhere and packed with valuable information, said T. Frank Downs, senior director of proactive services at BlueVoyant, an enterprise cybersecurity company in New York City. “Think about all the personal data your apps have access to — from your location and contacts to your financial details,” he told TechNewsWorld. “With everyone constantly glued to their phones, the potential for data harvesting is enormous. Plus, the mobile app landscape is so diverse, with lots of operating systems and app stores, making it challenging to roll out security measures that fit every scenario.” In addition, many mobile apps aren’t securely designed. “Apps leak everything attackers need without resistance,” maintained Chris Wingfield, senior vice president for innovations at 360 Privacy, a digital privacy and security services provider in Nashville, Tenn. “Mobile apps constantly emit soft identifiers such as install IDs, ad SDK metadata, and analytics payloads that expose device location and fingerprinting data,” he told TechNewsWorld. “None of it was designed for security, as it was originally designed for attribution.” “Threat actors don’t need root access,” he said. “They just need the data exhaust. And mobile applications give it to them quietly, at scale, across millions of sessions. It’s one of the most reliable recon surfaces in use today.” Tovar maintained that the security model for mobile applications is designed around regulatory compliance, not stopping fraud, account takeovers, or scams. “It’s a perfect place for attackers to spend their time,” he said. “They’re going to follow the money, and if more people are transacting on unprotected mobile applications, it’s a veritable green field for attackers,” he added. Security Gaps Leave In-App Activity Exposed Blackhat hackers are also taking advantage of many organizations’ focus on backend security at the expense of endpoint security. “Many existing schemes focus on backend analytics or user behavior signals, which don’t detect or stop threats occurring directly on the device or within the app,” explained Kern Smith, vice president of global solutions engineering at Zimperium, a mobile security company headquartered in Dallas. “This leaves gaps for malware, runtime manipulation, and credential theft,” he told TechNewsWorld. Downs acknowledged that server-side protections and analyzing user activity to catch odd behavior are crucial security measures, but added, “They often miss the mark when it comes to securing the app itself — things like app logic, data storage, and communication can still be vulnerable. This backend-heavy approach can leave some doors wide open for attackers who know how to circumvent traditional defenses.” That approach also ignores what many malicious actors are really seeking. “Most protection schemes still assume the threat is credential-based,” Wingfield said. “However, modern targeting can start before an account even exists.” “Ad SDKs, analytics tools, and attribution networks quietly collect a stream of metadata — IP-based geolocation, device model, OS version, time zone, motion events, and ad IDs,” he explained. “That telemetry leaves the app immediately — unencrypted, unaudited, and often unnoticed,” he noted. “None of it hits the backend, so traditional fraud tools don’t see it, and behavioral models don’t flag it,” he continued. “Meanwhile, that stream gets stitched together across apps to map movement, infer routines, and cluster identities by place and pattern. The gap isn’t just technical; it’s conceptual. We’ve been protecting credentials while the telemetry is what’s being harvested.” Server-Side Risks Still Dominate Mobile Threats Nevertheless, there’s a solid rationale for focusing on backend apps and APIs. “The mobile app has data for one user. The server side has data for all users,” said Jeff Williams, CTO and co-founder of Contrast Security, a runtime security company in Los Altos, Calif. “While there are some interesting risks on the client side, almost all of the critical risks are on the server side,” he told TechNewsWorld. “The risk is very asymmetric, and most of it falls on the server.” “Opportunities for direct attacks on a mobile app are pretty limited,” he added. “Generally, attackers don’t listen for connections. They reach out to servers instead.” Eric Schwake, director of cybersecurity strategy at Salt Security, an API security provider in Palo Alto, Calif., maintained there is a trend toward integrating in-app protection alongside traditional backend security measures. “This trend arises from the understanding that mobile applications are becoming increasingly susceptible to attacks that circumvent backend defenses and strike directly at the app,” he told TechNewsWorld. “In-app protection enhances security by reinforcing the app against tampering, reverse engineering, and runtime attacks,” he said. “This method is essential to tackle the changing threat landscape and defend against advanced attacks aimed directly at the app.” John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Mobile Apps0 Commentaires 0 Parts 141 Vue
-
WWW.TECHNEWSWORLD.COMGartner Identifies 12 Disruptive Technologies for Future Business SystemsGartner Identifies 12 Disruptive Technologies for Future Business Systems By John P. Mello Jr. April 8, 2025 5:00 AM PT ADVERTISEMENT SMB Software Companies: Playbook for Expansion & Growth Proven strategies to scale your company, grow market share, and win more customers. Download the free playbook today. AI will become the new UI, spending will increase to counter disinformation, and increased use of Earth intelligence gathered from space will be disruptive technologies in the near future, according to a report released Monday by global technology research firm Gartner. The three technologies were among 12 that Gartner predicted would define the future of business systems. Technology leaders must prioritize these over the next five years, as they present competitive opportunities in the near term and will eventually grow to become standard throughout businesses, Gartner contended. “Technology leaders must take action now to gain a first-mover advantage with these technologies,” Gartner Vice President Analyst Bill Ray said in a statement. “Innovative advancements like generative-AI-enabled code architecture, disinformation security, and Earth intelligence will provide the differentiation needed to help enterprises pull ahead of the pack in terms of data and product offerings.” AI Replaces Staid UI Gartner maintained that gen-AI solutions using free-form text and multimedia inputs/outputs will displace the conventional form-oriented sequential UI in established enterprise applications and enable new user scenarios. A user interface provides a way for a human to navigate and communicate with a machine naturally, explained Sandi Besen, an applied AI researcher at IBM and Neudesic, a global professional services company. “Since language models enable a system to communicate with humans natively through voice, text, or visually, we might not have as much need for a ‘user interface’ the way we know it today,” she told TechNewsWorld. “If you can interact with the computer using natural language, you don’t really need a secondary UI,” said Rob Enderle, president and principal analyst of the Enderle Group, an advisory services firm in Bend, Ore. “The AI becomes your user interface,” he told TechNewsWorld. “Much like you don’t need Windows to talk to someone else, you won’t need a UI to interact with your computer.” Besen pointed out, however, that some things are still difficult to control, like input validation, without a UI. “We are seeing the emergence of a ‘dynamic UI’ that adapts based on the inputs the user needs to provide the LLM rather than forcing the user to follow a predefined flow,” she said. Gartner Vice President Analyst Ray Valdes added in a statement, “To remain competitive, traditional enterprise application software vendors will need to refactor applications to serve composable gen-AI solutions that are invoked on demand via textual and multimodal prompts.” Because of that, Gartner predicts that by 2029, more than 50% of user interactions linked to enterprise business processes will leverage large language models to bypass the UI layer in traditional enterprise applications, up from less than 5% today. New Interest in Disinformation Security Gartner also predicts that by 2030, at least half of enterprises will have adopted products or services to address disinformation security, up from less than 5% in 2024. It explained that disinformation security is an emerging discipline focused on threats from outside the corporate-controlled network. It includes a suite of technologies, such as deepfake detection, impersonation prevention, and reputation protection, that can address disinformation to help enterprises discern trust, protect their brand, and secure their online presence. “Attackers are using AI to impersonate executives, manipulate communications, and erode confidence in what people see and hear online,” said Patrick Tiquet, vice president for security and architecture at Keeper Security, a password management and online storage company in Chicago. “For enterprises, this means protecting infrastructure isn’t enough,” he told TechNewsWorld. “They also need to secure the people behind it, ensuring digital interactions remain authentic and trusted.” Ishpreet Singh, chief information officer at Black Duck Software, an applications security company in Burlington, Mass., explained that the rapid evolution of artificial intelligence technologies, such as deepfakes, generative AI, and automated bots, enables malicious actors to create highly realistic and targeted false narratives at unprecedented scale and speed. “These sophisticated disinformation campaigns can quickly influence public perception, distort market realities, and undermine organizational credibility, directly threatening brand value and long-term stakeholder trust,” he told TechNewsWorld. Gartner Senior Director Analyst Alfredo Ramirez IV added in a statement: “Disinformation attacks use external infrastructure like social media and originate from areas with limited legal oversight. Tech leaders must add ‘disinformation-proofing’ to products by using AI/machine learning for content verification and data provenance tracking to help users discern the truth.” Earth Intelligence for Business Insights Gartner also predicts that by 2028, 80% of major Earth surface assets globally will be monitored by active satellites. Earth intelligence uses AI to analyze satellite, aerial, and ground data to monitor Earth’s assets and activities, providing insights for decision-making, it explained. “That doesn’t mean maps and charts,” Ray said. “Earth intelligence is delivering numbers on global nickel production, theme park revenue, and the health of wheat crops, to name just a few.” Earth intelligence also includes accurate weather forecasting. “Weather events can adversely impact logistics and supply chains, so being able to better predict them should allow companies to more effectively assure their operations,” Enderle noted. “In addition,” he continued, “weather events can put sites, customers, and employees at risk, so having a better predictive tool will allow companies to better protect these assets.” Given the breadth of applications, Gartner maintained that Earth intelligence is applicable to all industries and enterprises. Defense has been the first adopter, but improvements in data quality and analysis techniques have rapidly expanded the use cases. “Earth intelligence applies to every business,” Ray added. “Enterprises can gain an early advantage by creatively and strategically applying Earth intelligence to significantly enhance specific functionalities of existing systems or to compete via net new capabilities.” Disruptive Dozen Gartner organized its Disruptive Dozen into four categories: Application, Infrastructure, Data, and Security. Application disrupters include intelligent simulation, AI-composed applications, and polyfunctional robots. “Polyfunctional robots will be capable of performing an increasing number of jobs currently done by humans,” Enderle said. “Putting in place the support structure for these robots and programs to retrain or eliminate the then redundant employees will require a great deal of planning, time, and effort and will certainly disrupt operations during implementation, particularly if the site is unionized.” Infrastructure disrupters include algorithm-aligned silicon, low power/high compute, and sensor fusion. Among the data disrupters are Earth intelligence, hypersynthetic data, and domain language models. “Hypersynthetic data will make creating LLMs far easier and faster,” Enderle said. “However, the potential for this data to be unreliable increases significantly the farther you get from data with a more factual foundation. Quality has suffered significantly during the AI rollout, and hypersynthetic data could increase that exposure significantly.” Besen explained that domain language models are LLMs trained extensively within a “domain” of knowledge rather than on general data like GPT-4o. “They will be important, particularly for tasks that require a very deep understanding of specialized subjects like biology or chemistry, and which don’t require knowledge or the ability to reason outside their specific domain,” she said. “A domain model for biology might be excellent for interpreting patient symptoms and explaining a physician’s diagnosis to a user — but not helping them plan their upcoming travel itinerary.” Security disrupters include digital ethics, disinformation security, and preemptive cybersecurity. “Preemptive cybersecurity stands out because it shifts security from reaction to prediction,” Tiquet explained. “As threat actors increasingly weaponize AI and automation, waiting for an alert is no longer enough,” he continued. “Preemptive systems use AI-driven insights to uncover vulnerabilities, misconfigurations, and anomalies before they’re exploited.” “It’s a disruptive change because it forces organizations to rethink traditional tools and adopt continuous, intelligent threat anticipation across every layer — from endpoints to identities to cloud workloads,” he said. Singh added, “This forward-looking approach is especially critical in today’s ever-evolving digital landscape, where the increasing complexity of interconnected systems — including IoT devices, cloud services, and remote work platforms — creates a broader and more intricate array of security challenges.” John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Emerging Tech0 Commentaires 0 Parts 152 Vue
-
WWW.TECHNEWSWORLD.COMIntel Vision 2025: A Bold Leap Forward With Lip-Bu Tan at the HelmLast week, I was at Intels Vision conference at the Virgin Hotel in Las Vegas. While the venue was a bit problematic, the content was solid and showcased an empowered Intel that now needs to address some errors my old friend Pat Gelsinger made as CEO. These include turning the office of the CTO back into a visionary organization, empowering the CMO, adequately funding marketing (while fixing MDF), and ending the cycle of layoffs that has disrupted operational stability.I should point out that I remain impressed with Intels employees, who have weathered the prior storms and still performed in the face of this adversity. They are the unsung heroes of Intels survival.This week, Ill share some thoughts on Intels renewed direction under its new CEO. Then Ill close with my Product of the Week: Linux. The Linux presentation at the end of the second-day keynote reminded me that I was anything but a fan of the platform to begin with. However, it has matured into a true power in the industry, and The Linux Foundation has long been an effort that is both performant and praiseworthy.Intel Vision 2025 Delivers on Its PromiseWhen Intel Vision replaced Intels prior IDF conference, it seemed to lack vision. That changed this year. The 2025 keynote, delivered by Intels new CEO, Lip-Bu Tan, was a landmark event that showcased the companys ambitious roadmap for the future of computing. More than just a presentation of technological advancements, it was a demonstration of a company reinvigorated, led by a CEO uniquely positioned to drive Intels resurgence.Lip-Bu Tans ascension to the helm of Intel has been met with considerable optimism, and rightfully so. Unlike many new CEOs who require a significant period to acclimate, Tan arrives with a profound understanding of Intels inner workings. His prior tenure on Intels board gave him invaluable insights into the companys strengths, weaknesses, and opportunities. Furthermore, his proven track record as a successful tech industry CEO lends credence to his ability to navigate the complexities of the semiconductor landscape. This combination of institutional knowledge and executive experience makes him an exceptionally well-prepared leader for Intel at this critical juncture.The Vision 2025 keynote served as a powerful testament to this preparedness. Tan articulated a clear and compelling vision for Intels future, characterized by a relentless focus on innovation, strategic partnerships, and a commitment to regaining its edge in innovation.Intels Holistic Approach to AIA central theme of the keynote was Intels comprehensive approach to artificial intelligence. Tan emphasized that AI is not merely a feature but a fundamental transformation of computing, impacting every aspect of technology. Intels strategy, as he outlined, centers on providing a full stack of solutions, from silicon to software, to empower developers and enterprises to build and deploy AI applications at scale.This AI Everywhere strategy encompasses:AI-optimized hardware: Intel is developing a diverse portfolio of processors, accelerators, and interconnect technologies specifically designed for AI workloads. This includes advancements in CPUs, GPUs, and specialized AI chips, ensuring customers have the right tools for any AI task.Open software platforms: Intel is committed to fostering an open ecosystem for AI development. This involves contributing to open-source projects and providing robust software tools and libraries that simplify AI development and deployment.Ecosystem collaboration: Recognizing the complexity of the AI landscape, Intel is forging strategic partnerships with leading software providers, cloud service providers, and system integrators to deliver complete AI solutions.Lip-Bu Tan highlighted specific advancements in Intels product roadmap, including:Gaudi 3: The next generation of Intels Gaudi AI accelerators promising significant performance and efficiency gains for deep learning workloads.Falcon Shores: A new high-performance computing (HPC) accelerator designed to bridge the gap between AI and HPC, enabling the convergence of these two critical domains.Xeon processors with AI acceleration: Integrating AI acceleration capabilities directly into Intels flagship Xeon processors, making AI accessible to a broader range of applications.Embracing the Chiplet RevolutionAnother key pillar of Intels Vision 2025 is its embrace of the chiplet architecture. Tan underscored that the traditional monolithic approach to chip design is reaching its limits and that chiplets smaller, specialized chip components are the future of semiconductor innovation.Intels pioneering work in chiplet technology, including its Universal Chiplet Interconnect Express (UCIe) standard, enables the company to deliver more complex and versatile products. By disaggregating chip functions into smaller, reusable chiplets, Intel can:Accelerate innovation: Chiplets allow for faster development cycles, as individual components can be designed and tested independently.Increase flexibility: Chiplets enable the creation of highly customized solutions tailored to specific application requirements.Reduce costs: Chiplets can improve manufacturing yields and reduce development costs by reusing proven components.Tan emphasized that Intel is not only adopting chiplet technology internally but also actively promoting its adoption across the industry through the UCIe consortium. This open ecosystem approach will foster greater interoperability and accelerate the pace of innovation in the semiconductor industry.Intel Doubles Down on Chip ManufacturingLip-Bu Tan reiterated Intels unwavering commitment to manufacturing leadership. He stressed that owning and controlling its manufacturing capabilities is crucial for Intel to maintain its competitive edge and ensure a secure customer supply chain. Intels IDM 2.0 strategy, which combines internal manufacturing, external foundry partnerships, and Intel Foundry Services (IFS), is designed to achieve this goal. Tan highlighted the significant investments Intel is making in new fabs and process technologies, positioning the company to meet the growing demand for semiconductors.Intel Foundry Services (IFS) is a critical component of Intels strategy, aiming to become a leading provider of foundry services to other companies. Tan articulated a vision for IFS to become the foundry of choice for the AI era, offering specialized capabilities and technologies to support the development of next-generation AI chips.Strategic Partnerships: A Force MultiplierTan underscored the importance of strategic partnerships in achieving Intels vision. He emphasized that the computing landscapes complexity requires collaboration across the industry to deliver complete solutions.Intel is actively collaborating with a wide range of partners, including:Software providers: Working with companies like Microsoft, Google, and VMware to optimize software for Intel hardware.Cloud service providers: Partnering with AWS, Azure, and Google Cloud to enable seamless deployment of Intel-based solutions in the cloud.System integrators: Collaborating with companies like Dell, HP, and Lenovo to deliver complete systems and solutions to end users.These partnerships are essential for Intel to extend its reach and impact, ensuring that its technologies are accessible and easy to use for customers across various industries.A Resurgent Intel Under New CEOThe Intel Vision 2025 keynote was more than just a presentation of technology; it was a declaration of Intels resurgence. Under the capable leadership of Lip-Bu Tan, Intel is embarking on a bold new vision characterized by a relentless focus on innovation, strategic partnerships, and a commitment to reclaiming its technological leadership.Tans unique combination of experience and vision makes him an exceptionally well-equipped leader to guide Intel through this transformation. His deep understanding of the semiconductor industry and his proven track record of success position him to navigate the challenges and capitalize on the opportunities that lie ahead.The Vision 2025 keynote provided a compelling glimpse into Intels future, and the industry is watching with anticipation as Lip-Bu Tan and his team execute this ambitious roadmap. Intel is not just talking about the future of computing; it is actively shaping it.Intel Vision 2025: Key Takeaways and AnalysisSeveral key takeaways from the keynote warrant further analysis:AI as a pervasive force: Intels AI Everywhere strategy recognizes that AI is not a niche technology but a fundamental driver of innovation across all sectors. This holistic approach positions Intel to capitalize on the explosive growth of the AI market.Chiplets as a game-changer: Intels leadership in chiplet technology is poised to revolutionize chip design, enabling greater flexibility, customization, and performance a crucial differentiator for Intel in an increasingly competitive market.Manufacturing as a strategic advantage: Intels commitment to manufacturing leadership is essential for ensuring a secure supply chain and maintaining control over its technology roadmap. IFS has the potential to become a significant revenue driver for Intel.Partnerships as a necessity: The emphasis on strategic alliances reflects the recognition that no single company can address the complexities of the modern computing landscape alone. Collaboration is essential for driving innovation and delivering complete solutions.CEO leadership: Lip-Bu Tans preparedness and strategic vision are key to Intels success. His ability to articulate a clear roadmap and inspire confidence in Intels future is crucial for driving the companys transformation.Wrapping Up: Intels Next ChapterThe Intel Vision 2025 keynote was a powerful demonstration of Intels renewed focus and ambition. With Lip-Bu Tan at the helm, Intel is embarking on a bold journey to redefine the future of computing.The companys commitment to innovation, strategic partnerships, and manufacturing excellence positions it to reclaim its leadership role in the technology industry. The industry is keen to see how Intel will execute this ambitious vision.LinuxLinux and I had a very rocky start. I felt it was covering up problems rather than addressing them in the early 2000s. When I pointed that out, my life was threatened, one of my pets was stolen (and allegedly killed), and I resigned from Forrester, which turned out to be a good thing.I did go to war for a bit, but I also respected that the legitimate leaders of Linux calmed everyone down. I lived, and I was stronger for the experience and I really didnt enjoy working for Forrester in the first place.Since then, Ive come to respect Linux as a true power and companies like Red Hat as legitimate providers of powerful open-source solutions that were surprisingly high-performing and robust. Even Microsoft, over this period, came to respect and embrace Linux; more recently, it has become the unsung hero of the AI revolution.In the whirlwind of AI advancements, one foundational element often remains in the background, yet its impact is undeniable: Linux. Under the steadfast leadership of Jim Zemlin at The Linux Foundation who spoke at the Intel event and triggered this Product of the Week showcase this open-source operating system has quietly become the bedrock upon which the most cutting-edge AI technologies are built.While the recent market tremors caused by DeepSeeks emergence momentarily shook investor confidence, a more profound narrative is unfolding. This is a story of open-source collaboration, strategic foresight, and the democratization of AI. Linus Torvalds, the visionary behind Linux, continues to contribute his brilliance, albeit with the autonomy that fosters true innovation.Linux Powers the Future of AIThe shift toward inference, as AI transitions from research labs to mainstream applications, underscores the practical, real-world relevance of Linux. Its flexibility and robustness make it an ideal platform for deploying AI models at scale. Sam Altmans announcement of a forthcoming open-source model from OpenAI further solidifies this trend, highlighting the growing recognition that open collaboration fuels rapid progress. DeepSeeks impressive capabilities are a testament to the long-term strategic vision of embracing open-source technology. While some may perceive Chinas rapid advancements as a competitive threat, its essential to recognize that its approach is largely rooted in internal competition and a deep understanding of open-source principles, many of which were learned from the United States. The intense competition within Chinas tech sector, coupled with a focus on open source, has propelled them forward.Its a misconception to view open source as a barrier to competitive advantage. In todays interconnected world, its a powerful vehicle for achieving it. Intels decisive victory over Sun Microsystems proprietary platforms was largely attributed to its embrace of open-source strategies. Even Apple, a company synonymous with proprietary ecosystems, relies heavily on open-source software.The Engine of InnovationThe reality is that most of the code underpinning modern products and services is derived from open-source projects. With its vast community and continuous development, Linux stands at the forefront of this movement. Its the invisible force driving innovation, enabling developers to build upon a solid foundation and accelerating the pace of technological advancement.Under Jim Zemlins guidance, The Linux Foundation has cultivated an ecosystem that fosters collaboration, transparency, and shared progress. Its a testament to the power of collective intelligence, where contributions from individuals and organizations around the globe coalesce into a robust and ever-evolving platform.As AI continues to shape our world, Linux will remain an indispensable component, quietly powering the next generation of breakthroughs. Its open-source nature ensures accessibility, adaptability, and continuous improvement, making it the ideal foundation for a future where AI is seamlessly integrated into our lives.The Linux story is one of shared success, a testament to the power of open collaboration, and a reminder that the most profound innovations often arise from collective effort, so its my Product of the Week.0 Commentaires 0 Parts 172 Vue
-
WWW.TECHNEWSWORLD.COMSourcetable AI Spreadsheet Aims To Democratize Data AnalyticsSourcetable AI Spreadsheet Aims To Democratize Data AnalyticsBy John P. Mello Jr.April 1, 2025 5:00 AM PTImage Credit: Sourcetable ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! During the dawn of the PC era, a single program was touted as the killer app that fired the market for personal computers. That program was a spreadsheet called VisiCalc. Now, another spreadsheet could have a similar impact on the AI market.Announced Monday, along with US$4.3 million in venture funding, the new spreadsheet, cloud-based Sourcetable, promises to use AI to democratize data analysis for everyone. While 750 million people use spreadsheets every day, only 20% know how to use basic analytical functions, according to Sourcetable.It explained in a statement that the AI spreadsheet eliminates the technical barrier that has plagued spreadsheets since their inception. Users simply tell the spreadsheet what they want done through natural language commands, and Sourcetables AI does the work for them. Instructions can be made via keyboard or through a hands-free voice control mode.Sourcetable added that the spreadsheets autopilot mode can complete a wide range of complex tasks that typically require advanced spreadsheet knowledge, including creating and editing financial models, generating spreadsheet templates, building pivot tables, cleaning data, creating charts and graphs, editing formatting, enriching data, and analyzing entire workbooks.In addition, the AI can understand data context without requiring users to pre-select ranges, interpret multiple ranges across different tabs, work with messy data, and seek human clarification when instructions are unclear.Smart AI Analyst On DemandWe make it easier for executives and managers to have a lot more digital intelligence at their disposal to do tasks, said Sourcetable CEO Eoin McMillan. We also make it easier for junior employees or recent grads to upskill very, very quickly.And we make it easier for people, whether theyre in marketing or sales or accounting or finance, to do both complex workflows, which may not have been possible before based on their skills and training, as well as save them a lot of time on simple workflows, which can be manually intensive, he told TechNewsWorld.Eoin McMillan, CEO, and Andrew Grosser, CTO, are the co-founders of Sourcetable. Photo by Sophia Morel.McMillan explained that partnering with AI is like having a brilliant digital analyst on demand. It allows you to do harder things easier and time-consuming tasks faster. Workflows that took hours can take minutes.Chris Sorenson, CEO of PhoneBurner, a power dialer SaaS company in Seattle, maintained that bringing AI into spreadsheets is a logical evolution. Spreadsheets are powerful, but traditional spreadsheets require a high level of expertise to manipulate large datasets, build formulas, and extract insights, he told TechNewsWorld. As someone with a sales background, I speak to this from experience.With AI, we are seeing a shift people can ask natural-language questions and get real answers without needing to be a data analyst, he said. Thats a major productivity unlock, especially for teams that dont have dedicated data pros on hand.I do think Sourcetables idea that everyone can become an analyst has merit, he continued. It lowers the barrier to entry for data-driven decision-making. But theres still a learning curve in understanding what the AI is doing behind the scenes and theres always a risk of misinterpreting data if you take results at face value without understanding the context. I really believe this could be similar to what VisiCalc did for PCs, he asserted. If AI can better turn spreadsheets into something smarter and more accessible, it could become a gateway to broader AI adoption across departments, but time will tell.Mark N. Vena, president and principal analyst with SmartTech Research in Las Vegas, agreed. Just as VisiCalc and Lotus 1-2-3 brought computing to a broader audience by solving a practical need for accounting and planning, AI spreadsheets could do the same for AI, he told TechNewsWorld. They package powerful capabilities into a familiar interface, making AI accessible to a much wider group of users.Killer App or Spreadsheet Killer?Robin Patra, head of data, analytics, and AI at a large U.S. contractor that relied heavily on Excel workflows before moving to Sourcetable, maintained that just as VisiCalc and Lotus 1-2-3 popularized PCs, AI spreadsheets could catalyze mainstream AI adoption.VisiCalc transformed spreadsheets from paper-based ledgers to digital tools, driving Apple II sales, he told TechNewsWorld. Similarly, Sourcetables self-driving interface represents a paradigm shift.VisiCalc also enabled non-programmers to compute finances, he added. Sourcetable empowers non-technical users to execute advanced analytics. While Sourcetable could be a killer AI app, it could also be a spreadsheet killer. AI will likely make spreadsheets as we know them obsolete because it can take direction and potentially create better outcomes without needing the spreadsheet technology to arrive at this better outcome, explained Rob Enderle, president and principal analyst at the Enderle Group, an advisory services firm in Bend, Oregon.You just tell the AI what you need, input the data, and then get the improved results, he told TechNewsWorld.He cautioned that AI can have accuracy problems even with math. AI can introduce hard-to-identify errors, making the results unreliable, he warned.How AI Spreadsheets May Shape the FutureTo be clear, Vena added, one non-trivial downside is over-reliance on AI-generated output, which may not always be accurate or explainable.Theres also the risk of reduced skill development in traditional analysis methods and potential privacy concerns when data is processed through AI systems, he said.Sourcetables contention that AI can make everyone an analyst needs to be examined critically, he added. AI can level the playing field by enabling non-experts to run analyses and extract insights, he noted, but Sourcetable assumes that AI always delivers useful or correct answers which isnt guaranteed. Users still need judgment to interpret results, so like any AI technology, its not fail-safe.Looking forward, Sourcetable could influence not only spreadsheet applications but also consumer applications in general. AI spreadsheets could phase out roles centered on manual data entry, shifting demand toward AI management skills, Patra said.Natural language interfaces could also start to replace traditional GUI-based tools, he added.AI-powered consumer tools like Sourcetable could reshape productivity software, Vena said. They may lead to faster decision-making, more empowered individuals, and broader adoption of data-driven thinking.However, he continued, they also raise issues around data security, job displacement, and trust in automated systems. But putting those issues aside, this has the potential as a real breakthrough that both businesses and mainstream consumers could benefit from.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.More by John P. Mello Jr.view allMore in Artificial Intelligence0 Commentaires 0 Parts 179 Vue
-
WWW.TECHNEWSWORLD.COMNvidia GTC Sets Bold AI Vision but Leaves Questions UnansweredNvidias GTC (GPU Technology Conference) has firmly established itself as the leading event for artificial intelligence (AI) and accelerated computing. GTC 2025 was no exception. It was packed with significant announcements and showcased the companys continued dominance in the AI hardware space. However, the event also highlighted some potential challenges and shifts in the competitive landscape.Lets break down the key announcements from GTC 2025. Then, Ill close with my Product of the Week a standout AI laptop from Lenovo that reflects where PC innovation is heading.GTC 2025: Key AI and Hardware RevealsGTC 2025 saw Nvidia unveil a range of new products and technologies, reinforcing its position at the forefront of AI innovation. Key announcements included:Blackwell Ultra: Nvidia introduced the Blackwell Ultra GPU architecture, an enhanced version of its Blackwell platform designed for demanding AI reasoning models. Blackwell Ultra boasts increased memory capacity and improved performance, further solidifying Nvidias commitment to pushing the boundaries of AI compute.Rubin Architecture: Looking ahead, Nvidia announced the Rubin architecture, the successor to Blackwell, promising even better performance and efficiency for AI data centers. This announcement underscores Nvidias annual cadence of innovation in AI infrastructure.Isaac GR00T N1: Nvidia made a significant push in robotics with the unveiling of Isaac GR00T N1 (pictured above), the worlds first open, fully customizable foundation model for humanoid robots. This initiative aims to accelerate the development of general-purpose robots capable of performing a wide range of tasks.Quantum Computing Efforts: Nvidia announced its foray into quantum computing by establishing the Nvidia Accelerated Quantum Computing Research Center (NVAQC) in Boston. This initiative signals Nvidias intention to play a key role in the future of quantum computing.These announcements demonstrate Nvidias continued focus on driving advancements across the AI spectrum, from fundamental hardware to software platforms and emerging fields like robotics and quantum computing.Risks of Nvidias AI Market LeadershipNvidias dominant position in the AI hardware market also carries inherent risks. The danger of being the leader in any field is the potential to become complacent and take competition for granted. While Nvidia continues to innovate, there were aspects of GTC 2025 that raised some concerns. Notably, the event lacked the compelling demonstrations of real-world AI applications that characterized previous GTCs. In past years, GTC showcased how Nvidias technology was being used to solve specific problems and drive innovation across various industries.This year, with the exception of robotics, the focus seemed to be more on the underlying technology and future roadmaps than on tangible, present-day applications.Missed Opportunity for AI in ActionWhile the robotics demonstrations were impressive, they often leaned toward entertainment rather than showcasing practical applications for getting real-world work done. For example, while seeing a robot out of Star Wars is fun to watch, it may not have resonated as strongly with professionals seeking to leverage AI for business productivity or scientific research.Furthermore, Nvidias CEO, Jensen Huang, a charismatic and influential figure in the tech industry, did not prominently feature a personal AI assistant or demonstrate how he personally uses AI to enhance his daily workflow.In an era where AI assistants should be becoming increasingly sophisticated, the absence of such a demonstration from the leader of an AI powerhouse was notable. This absence raises questions about the maturity and practicality of AI assistants in everyday executive use, or at least Nvidias public messaging around them.Growing Threats to Nvidias AI DominanceNvidias dominance in the AI hardware market is also facing increasing competition:AMD has emerged as a strong number two in the GPU market, making significant inroads into Nvidias traditional strongholds. AMD offers competitive products and solutions, particularly in the data center space, and is gaining traction with key customers.China is rapidly developing its own AI hardware capabilities. Companies like Huawei and others are investing heavily in domestic GPU and AI chip development, driven by both commercial ambitions and a desire for technological self-reliance. Given the ongoing geopolitical tensions and trade restrictions, Chinese companies are highly motivated to create competitive alternatives to Western technology, including Nvidias products.A Quantum Leap?Nvidias increased focus on quantum computing, highlighted by the announcement of its new research center, represents a potentially transformative shift for the company. While still in its early stages, quantum computing holds the promise of revolutionizing computation and solving problems that are intractable for classical computers.However, Nvidia is entering a field with already established players. Companies like IBM, Google, and numerous startups are actively pursuing quantum computing research and development. China is also making significant investments in this area, viewing it as a strategic technology for future economic and technological leadership. Other companies with compelling quantum efforts include:Rigetti ComputingHoneywell Quantum SolutionsIonQPsiQuantumNvidias expertise in accelerated computing could give it an advantage in developing hybrid quantum-classical systems, but it faces stiff competition from these established players.Gaming Takes Back Seat at GTCAnother notable aspect of GTC 2025 was the relative lack of emphasis on gaming.In the past, GTC was a significant event for showcasing the latest advancements in gaming technology, with a strong focus on graphics performance and new gaming experiences. However, gaming took a backseat to AI and data center technologies this year. The absence of significant announcements related to AI-powered non-player characters (NPCs) in games was conspicuous. While AI has the potential to revolutionize gaming by creating more dynamic, realistic, and engaging virtual characters, this area did not seem to be a major focus at GTC 2025.Wrapping UpNvidia is undoubtedly at a pivotal moment. The companys leadership in AI hardware has propelled it to unprecedented success, but it cannot afford to rest on its laurels. To maintain its position and capitalize on the full potential of AI, Nvidia must:Demonstrate Real-World Impact: Focus on showcasing how its technology is being used to solve practical problems and drive tangible benefits across industries.Embrace the Application Layer: Go beyond simply providing the hardware and play a more active role in enabling the development of innovative AI applications.Navigate the Competitive Landscape: Aggressively address the challenges posed by rising competitors like AMD and Chinas growing technological prowess.Strategically Pursue New Frontiers: While exploring promising areas like quantum computing is essential, Nvidia must ensure that these efforts complement, rather than distract from, its core focus on AI.Remember Its Roots: While the company has expanded far beyond its gaming origins, Nvidia should not completely abandon this market, as it remains an important source of innovation and a key driver of technological advancement.GTC 2025 underscored Nvidias continued leadership in AI hardware but also highlighted the challenges and opportunities that lie ahead. To thrive in the long term, Nvidia must remain focused, demonstrate the practical power of AI, and avoid devolving into a company that merely touts speeds and feeds.Lenovo ThinkPad X9 14 Aura EditionPhoto by AuthorThe Lenovo ThinkPad X9 14 Aura Edition represents a change of direction from traditional ThinkPad design, offering a modern, ultraportable take on the business laptop. It also showcases how far Intel has come in the AI PC race. The X9 14 Aura Edition sports a sleek, slim, and light design, a departure from the classic matte black hybrid chassis of previous ThinkPads.Design and Build QualityIts constructed from recycled aluminum and comes in a Thunder Gray color. It has premium build quality and feels modern, with tiny display bezels and a sizeable haptic touchpad. To achieve its slim profile, Lenovo incorporated an engine hub bar at the bottom rear of the laptop, housing expansion ports and the cooling system. This design is functional and gives the X9 a unique look.The laptop is also MIL-STD 810H certified, indicating it can withstand travel hazards like shock, vibration, and extreme temperatures. Its unique ribbed bottom makes it one of the easiest Ive tested to hold and carry.Display Options and Visual ExperienceThe X9 14 Aura Edition features a 14-inch display. A key highlight is the option for a 2.8K OLED touchscreen, which is described as bright and colorful and offers excellent contrast. The OLED display supports Dolby Vision and Windows 11s adaptive color capabilities. Other configurations include a 1920 x 1200 resolution non-touch display.The laptop is designed for efficiency and extended power. In terms of performance, the device is powered by Intel Core Ultra processors and includes integrated Intel Arc graphics. Configurations come with LPDDR5X memory. Storage is provided by M.2 PCIe Gen4 SSDs.Performance and AI CapabilitiesThe X9 14 Aura Edition includes AI features co-developed with Intel, such as Smart Modes like Attention and Wellness. It has a high-resolution 8 MP webcam, which is noted for its quality. It includes Thunderbolt 4 ports, an HDMI port, and Wi-Fi 7 for connectivity. Security features include a fingerprint reader in the power button and Windows Hello face recognition.Keyboard, Touchpad, and AudioThe keyboard is an island-style keyboard with soft, flat, square keys. Some reviews note that it has a shallower feel compared to the keyboards on other ThinkPad models. The laptop has a large, buttonless touchpad that glides smoothly.In terms of audio, the X9 14 Aura Edition includes downward-firing stereo speakers with Dolby Atmos spatial audio capabilities. The audio quality is described as clear and sufficient to fill a room.Bottom Line on the ThinkPad X9 14 Aura EditionThe X9 14 Aura Editions pros include its compact and modern design, premium build quality, gorgeous OLED display option, and modern connectivity features. Its cons include a keyboard that may not be Lenovos best, a lack of USB-A ports and an SD/microSD card slot, and no mobile broadband option in some configurations.Overall, the Lenovo ThinkPad X9 14 Aura Edition is a modern and stylish ultraportable laptop that blends performance, portability, and a premium user experience. This business laptop is a departure from traditional ThinkPad designs, targeting users who prioritize a sleek and modern aesthetic without sacrificing business-grade features and it earns my pick for Product of the Week.0 Commentaires 0 Parts 187 Vue
-
WWW.TECHNEWSWORLD.COMMy 4 Gripes With Apple and Why WWDC Really Matters This YearApple, why have you forsaken users like me? I feel like youre beginning to take me for granted.I know that Apple is still one of the most influential tech companies on the planet, and I fully recognize that its products continue to set the bar in industrial design, brand loyalty, and ecosystem integration.But not everything is perfect in Cupertino.Despite Apples dominance, there are discernible cracks in the experience: frustrations that long-time users and analysts cant ignore. Not to mention that Samsung recently extracted me from the Apple ecosystem with its new Galaxy S25 Ultra.While Apple continues to lead in many areas, aspects of its ecosystem have begun to show signs of wear. Here are four specific gripes that detail missed opportunities and areas for improvement for Apple in 2025.1. The Apple Watch Feels StagnantWhen Apple Watch launched in 2015, it was a bold leap into wearables. But nearly a decade later, the product feels stuck in place.Battery life remains a glaring issue. Most baseline models still need nightly charging, which is a massive problem for a device that needs to be worn on the body and is marketed as a health monitor and sleep tracker.Even in the 2024 Series 9 and SE models, Apple hasnt pushed the battery life boundary forward. Multi-day wear standard in devices from competitors like Garmin or even budget Fitbit models remains out of reach. The design language hasnt meaningfully evolved either. While Ultra models added bulk and utility, the mainstream Apple Watch still looks and feels like a product from five years ago.The market reflects this fatigue. According to a recent report from Counterpoint Research, global smartwatch shipments fell in 2024, with Apple losing share. The data suggests user enthusiasm is cooling and Apple hasnt responded with the bold rethinking it once championed.Heres a provocative question: What if Apple treated the Watch as a health-first platform instead of just a phone accessory?2. Apple Intelligence Isnt Delivering a BreakthroughThere were high expectations when Apple announced its push into generative AI, dubbed Apple Intelligence. This point isnt only my opinion, as Apple has been under fire from the media for its sluggish ability to make Apple Intelligence resonate with mainstream consumers. Not to mention that Apple changed the management leadership overseeing this capability within the company.Apple has not identified a standout usage model that resonates with a broad consumer base. Theres no ChatGPT moment. Instead, Apples AI ambitions feel vague and scattered. Features like auto-summarizing messages, writing assistance, or Siri enhancements are interesting but incremental.Saying Apple Intelligence hasnt lit the world on fire may be an understatement.Unlike Microsoft, which integrates AI deeply into the productivity stack, or Google, which is aggressively building Gemini into its services, Apple hasnt identified a killer use case. Nor has it clearly positioned Apple Intelligence as a system-wide differentiator.Thats problematic.Consumers are increasingly aware of AI but need to see tangible value. Apples AI story currently lacks urgency, clarity, and consumer pull. The company needs the proverbial killer app (or at least usage model) that gets mainstream consumers on board. Remember Lotus 1-2-3?The bottom line is that Apple needs to make AI feel indispensable to everyday users not just a list of background features.3. The iPhoneWindows Experience Remains PainfulIn 2025, cross-platform integration should be seamless.Yet, if you use an iPhone and a Windows 11 PC, it still feels like two worlds that refuse to talk. This issue is, perhaps, my biggest peeve with Apple.Basic tasks like message syncing, photo transfers, and notifications often involve clunky workarounds. Theres no true equivalent to iMessage or AirDrop on Windows even though nearly half of U.S. users run Windows PCs.Yes, Apple and Microsoft have made minor progress. Features like iCloud integration in the Photos app or the recent Phone Link improvements are a step forward. But theyre patchwork solutions, not a cohesive strategy. In contrast, Android users get a far smoother experience with Windows out of the box thanks to better file sharing, notifications, and cross-app integration.Apple may want to keep its ecosystem closed. However, doing so risks alienating a massive segment of its user base that lives in both the Apple and Microsoft worlds.The question worth asking is whether the walled garden is still a strength or is becoming a liability in a multi-device/multi-brand era.4. Apple Is Behind on Foldable PhonesFoldables are no longer a niche experiment. Samsung has iterated rapidly. Google, OnePlus, and Huawei are pushing new designs. Even midrange foldables are entering the mainstream.Yet, Apple still hasnt entered the race.Despite years of rumors, weve seen no tangible movement on a foldable iPhone. There are no prototype previews, no developer hints, and no firm timeline.Thats puzzling. While Apple isnt usually the first to enter a category, it usually sets the standard when it does. The lack of any real foldable roadmap raises questions about Apples willingness to take hardware risks.Some reports suggest Apple is experimenting behind the scenes. But thats not enough. The market is maturing now, and users expect new form factors that offer flexibility, multitasking, and larger screens in compact devices.By waiting too long, Apple risks looking like a follower rather that an innovator.The hard truth is that Apple risks missing a generational hardware shift if it doesnt show leadership here.WWDC 2025: A Chance To Reset the NarrativeApple still has time to correct its course, and its Worldwide Developers Conference in June is the perfect opportunity.These issues wearable fatigue, AI uncertainty, cross-platform friction, and form factor hesitation could be addressed through bold announcements and more precise product direction.Imagine if WWDC delivers:A redesigned Apple Watch with multi-day battery life and new health sensorsA more compelling and intuitive Apple Intelligence platform that redefines mobile AIDeeper iPhoneWindows integration that finally removes the frictionA foldable iPhone concept that sets a new design benchmarkApple is unquestionably capable of all of this. The question is whether it will rethink its product roadmap and move faster.Users are no longer satisfied with just minor updates. Theyre hungry for fresh ideas, more substantial experiences, and openness.WWDC could either mark a turning point or reinforce the growing perception that Apple is slowly losing its edge. So, the big question is: Will Apple rise to the occasion in June?0 Commentaires 0 Parts 187 Vue
-
WWW.TECHNEWSWORLD.COMThe Expanding Role of Red Teaming in Defending AI SystemsAI red teaming the practice of simulating attacks to uncover vulnerabilities in AI systems is emerging as a vital security strategy.Traditional red teaming focuses on simulating adversarial tactics to identify vulnerabilities in static systems applications built on predictable coding frameworks. While challenging, these engagements rely on decades of collective experience and a well-understood threat landscape. Artificial intelligence systems, meanwhile, present fundamentally different challenges.Unlike traditional applications, AI systems are dynamic, adaptive, and often opaque, making vulnerabilities harder to identify. The threats targeting these systems are also unique, ranging from adversarial inputs that manipulate model behavior to malicious modifications of the models themselves. Understanding these differences is critical for securing AI-powered operations.Understanding AI Red TeamingAI red teaming systematically probes AI systems to identify vulnerabilities and potential exploits. Like traditional red teams, AI red teams emulate adversarial tactics to uncover weaknesses before they can be exploited. However, the challenges in AI environments are amplified by model complexity, novel attack vectors, and the high stakes of failure.Red teaming spans critical areas. Adversarial machine learning (ML) techniques involve crafting inputs to deceive models into making incorrect predictions. Model file security focuses on identifying vulnerabilities in the serialized files that store machine learning models, ensuring they cant be exploited as vectors for malicious code. Operational security examines risks within AI workflows and supply chains, pinpointing exposure points adversaries might exploit.Why AI Red Teaming Is CriticalThe adoption of AI has transformed industries, introducing significant risks alongside benefits. Models trained on sensitive data, deployed in distributed environments, or integrated into decision-making processes create a broader attack surface. Adversaries can manipulate inputs through vulnerabilities in large language models (LLMs), leading to unintended outputs or actions.AI models, often valuable intellectual property, are also vulnerable to theft or sabotage, leading to severe business impacts. Maliciously crafted models can even act as malware, leaking sensitive data when deployed.For example, an attacker might embed harmful code within a serialized model file. If a machine learning engineer unknowingly loads the file, the attacker could gain access to sensitive systems. This threat is particularly severe in industries like healthcare and finance, where compromised models could directly impact operations and compliance.Modernizing Red Teaming for AITraditional cybersecurity measures often fail to address AI-specific threats. Unlike fixed codebases, AI models are dynamic and adaptive, introducing unpredictable vulnerabilities that require innovative testing strategies.AI attack vectors often involve reverse engineering or adversarial attacks that undermine predictions. Additionally, tools designed to secure AI systems can sometimes be weaponized for offensive use, requiring a deep understanding of their dual-use capabilities. These challenges underscore the necessity of AI red teaming as a specialized cybersecurity discipline. By focusing on AI systems unique vulnerabilities, red teams can identify risks that traditional approaches may overlook, ensuring a more robust defense.Given the growing use of AI in business-critical applications, AI red teaming is emerging as an essential cybersecurity strategy. This process requires continuous adaptation to evolving threats. Integrating AI red teaming into an organizations security framework reduces catastrophic model failures, builds stakeholder confidence in AI initiatives, and keeps organizations ahead of adversaries.Best Practices To Get Started With AI Red TeamingTo integrate AI red teaming into an enterprise security strategy, consider these best practices for building a robust and proactive approach to safeguarding AI systems.Assemble a Multidisciplinary TeamAn effective AI red team requires AI experts to address model architecture and vulnerabilities, cybersecurity professionals to tackle adversarial tactics, and data scientists to analyze risks like poisoning or unauthorized manipulation. This combination ensures a comprehensive approach to securing the AI lifecycle.Identify and Prioritize Critical AI Assets for TestingFocus on assets that handle sensitive data, perform critical functions, or are publicly accessible. Catalog models, data pipelines, and APIs, prioritizing systems like fraud detection or customer authentication where vulnerabilities could have significant consequences.Collaborate With Blue TeamsRed and blue teams must work together to strengthen defenses. While red teams simulate attacks to uncover vulnerabilities, blue teams focus on detection, response, and mitigation. Sharing findings from red teaming helps improve blue team capabilities and align strategies against real-world threats.Use Specialized ToolingEquip your red team with tools tailored to AI environments, including frameworks for adversarial inputs, reverse engineering model embeddings, or simulating API attacks. These tools help target AI systems more effectively and uncover weaknesses that traditional security testing might miss.Implement Automated TestingFor organizations managing large-scale AI deployments, automated red teaming tools streamline vulnerability detection across multiple models and pipelines, enabling comprehensive coverage without overburdening teams.Ensure Compliance With Privacy GuidelinesEstablish protocols to ensure red teaming activities meet privacy and regulatory standards. This includes anonymizing sensitive data in testing environments to safeguard personal and proprietary information. Proper compliance not only protects your organization legally but also ensures ethical testing practices.Making Red Teaming Part of AI StrategyBy adopting a proactive approach to AI security with red teaming, businesses can uncover hidden vulnerabilities, reduce risks, and build resilient systems. Compared to static applications, the dynamic nature of AI systems makes offensive testing even more important for safeguarding operations, maintaining stakeholder trust, and driving innovation with confidence.0 Commentaires 0 Parts 194 Vue
-
WWW.TECHNEWSWORLD.COMScreen Time of Americans Above Global Average: StudyScreen Time of Americans Above Global Average: StudyBy John P. Mello Jr.March 26, 2025 5:00 AM PT ADVERTISEMENTB2B Online Chicago Get in the GameGreat teams win with great plays. At B2B Online Chicago, youll get the strategies top eCommerce and digital marketing pros are using to drive growth. Dont sit on the sidelines - get in the game. Use code B2BCHI25PARTNER for 20% off. Americans spend an average of six hours and 40 minutes a day staring at the screens of their computers, phones, and other electronic devices.If that sounds like a lot, it is, but its only two minutes above the global average, according to a worldwide screen time study released Wednesday by Comparitech, a reviews, advice, and information website for consumer security products.While staring at screens for more than six hours a day may sound excessive, experts appear conflicted on the subject. It is hard to define what is excessive when it comes to screen time, especially as many of us rely on the use of screens for work, said Comparitech Head of Data Research Rebecca Moody.However, where things perhaps do become excessive is in their mobile screen time which isnt likely to come from work-related activities for the majority of people, she told TechNewsWorld.According to the study, Americans spend three hours and 22 minutes daily staring at mobile screens, slightly below the global average of three hours and 46 minutes.Titania Jordan, chief parent officer at Bark a parental control and monitoring solutions company in Atlanta and author of Parental Control: A Guide to Raising Balanced Kids in the Digital Era, explained that every person is different and depending on their work type, the amount of screen time will vary dramatically.One thing to keep in mind when gauging whether youre spending too much time on screens is if its interfering with other aspects of your life and how old you are, she told TechNewsWorld.Are you foregoing real-life hangouts? she asked. Is your work or school suffering? Are you getting enough quality sleep? Do you feel more anxious or depressed after doom-scrolling? All these factors come into play when figuring out your personal screen-time sweet spot.Is 6 Hours of Screen Time Too Much?To determine if an amount is too much or too little, we need to know what the damages and benefits to the individual are, added Rob Enderle, president and principal analyst at the Enderle Group, an advisory services firm.If this is making them less healthy, which I expect it likely is by causing eyesight degradation, issues resulting from the lack of exercise, socialization issues, and creating excessive political polarization then, yes, it is way too much time, he told TechNewsWorld.But there could be offsetting benefits, especially when facing multiple potential pandemics, as the isolation keeps them safer, and some may be more productive that way, he continued.In the end, though, for most, I expect this is extremely unhealthy, he added. Six hours of screen time is absolutely excessive for most people, argued Mark N. Vena, president and principal analyst with SmartTech Research in Las Vegas. Six and a half hours is nearly a third of the day, excluding sleep and work, much of it spent passively consuming content, he told TechNewsWorld.While some screen use is productive or relaxing, large daily totals suggest a displacement of healthier habits like exercise, in-person interaction, and sleep, he added. The concern isnt just the time but what that time replaces, which is something parents should focus on with their kids.Larry D. Rosen, professor emeritus at California State University, Dominguez Hills, who has written extensively on the psychology of technology and screen time, agreed that six-plus hours of screen time is excessive. It takes away from time spent interacting with people face to face, as well as limiting time spent doing non-screen activities, such as exercise or just allowing our brain to wander, he told TechNewsWorld.He added that the data hes gathered on mobile phone usage shows far more screen time than the average in the survey, with the majority spent connecting to others through social media and messaging.According to the survey, Americans spend an average of two hours and nine minutes a day on social media, slightly lower than the worldwide average of two hours and 21 minutes.It noted that the social media platforms that Americans are most fond of include YouTube, which is used by 85% of U.S. adults, Facebook (70%), Instagram (50%), Pinterest (36%), TikTok (33%) and LinkedIn (32%).Screen Time Higher in Developing RegionsOverall, according to the study, South Africans were the biggest screen consumers, spending nine hours and 27 minutes a day on screens. The biggest desktop screen consumers were the Russians, spending four hours and 31 minutes a day on screens, while Filipinos were the largest mobile screen consumers, spending five hours and 21 minutes a day on screens.On the whole, the study noted the biggest screen-time consumers were in Africa, Asia, and South America. [Screens have] become the primary source of news in the non-first-world countries since the Arab Spring, Rosen said.In many of these regions, its important to note that smartphones are the primary gateway to the internet, making screen use a central part of daily life, Vena explained. High youth populations and rapidly growing digital economies contribute to greater mobile engagement, he added. In some cases, there may be fewer accessible offline entertainment or public infrastructure options. Social media and streaming platforms also offer affordable entertainment where traditional media is limited or costly.Jordan noted that certain platforms like TikTok, Instagram, and WhatsApp are extremely popular in these areas, not only for social interaction but also for business exchanges and news consumption.Also, she continued, many of these countries skipped broadband and slower-growth internet completely, jumping quickly to mobile-connected devices and Wi-Fi. This, in turn, meant people in these regions had smartphones first as opposed to desktops and spent more time online due to the mobility of their devices.Global Screen Time Trends Shift DownwardComparitech researchers also found that more than half the countries in the study (27 of 49) reduced their screen time from last year. Hong Kong showed the largest reduction, slicing 50 minutes off its average, dropping from seven hours and 55 minutes to seven hours and 26 minutes.With more countries improving their screen time this year, the most obvious reason for a drop in screen time would be a continuation of normalcy, post-pandemic, the researchers noted.Also, they continued, people have become more aware of the negative impacts lengthy screen time has on their mental health.Furthermore, they added, advancements in technology, such as improved digital well-being features on smartphones and applications, may have contributed to the decrease in screen time by encouraging users to monitor and limit their screen usage.Many of us are becoming increasingly aware of the negative impacts of spending too much time looking at a screen and are perhaps consciously unplugging our devices for an hour or so before we go to sleep, Moody said. Alex Ambrose, a policy analyst with the Information Technology and Innovation Foundation, a research and public policy organization in Washington, D.C., noted that nations have tried to regulate screen time.Time-online policies are sometimes used as an attempt to lower screen times, but they are difficult for policymakers to enforce, she told TechNewsWorld. China, for example, instituted a three-hour-per-week limit for children playing video games. While 77% of children reduced their gaming time under this policy, 29% also reported using their parents accounts as a workaround to the time limit.Some platforms have taken voluntary steps to tackle any potential harms, with measures such as allowing users to limit their screen time and see screen-time reports, or notifying them to take a break whenever they have spent a certain amount of time on an app, she continued.Rather than implementing prescriptive policies that hinder user experience and leave little room for innovation, many technology companies instead adopt customizable user and parental control systems such as screen-time controls and prompts to take breaks after using the apps for extended periods of time, she added.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Internet0 Commentaires 0 Parts 181 Vue
-
WWW.TECHNEWSWORLD.COMCrashing the Boys Club: Women Entering Cybersecurity Through Non-Traditional PathsCrashing the Boys Club: Women Entering Cybersecurity Through Non-Traditional PathsBy John P. Mello Jr.March 25, 2025 5:00 AM PT ADVERTISEMENTB2B Online Chicago Get in the GameGreat teams win with great plays. At B2B Online Chicago, youll get the strategies top eCommerce and digital marketing pros are using to drive growth. Dont sit on the sidelines - get in the game. Use code B2BCHI25PARTNER for 20% off. Although many women take the traditional IT route into cybersecurity, a large portion (37%) have entered cyber from non-IT or military positions, according to a survey released Friday by ISC2, the organization that maintains and administers the Certified Information Systems Security Professional (CISSP) certification exam.The organization reported that a significantly higher percentage of women than men who participated in the same study have leveraged education, professional development, self-initiated experience opportunities, and apprenticeships to pursue their careers.The report also noted that 56% of women respondents said their organizations are already changing their hiring requirements to bring in more people from non-cybersecurity backgrounds. This is illustrative of employer efforts globally to widen the potential cybersecurity talent pool without compromising standards, the report maintained.This is something that we currently observe not only in cybersecurity but in tech roles in general, said ydrn Vitait, business unit manager for Monitum, a software-as-a-service company specializing in smart security solutions with offices in Sweden and Lithuania, and a co-founder of Women Go Tech, an NGO that focuses on empowering women in the tech industry.First of all, women who had previously built careers in different sectors have more diverse backgrounds, stronger problem-solving skills, and advanced pattern recognition skills, she told TechNewsWorld.Another key advantage here is transferable skills, she continued. Such women can work in dynamic environments, where not only knowledge but traits such as curiosity, problem-solving, creativity, and other aspects matter.From our experience in re- and up-skilling programs, we have seen adult women in their thirties to forties deciding to shift from non-tech to tech, and they do it exceptionally successfully, she added.Non-IT Backgrounds Open Cybersecurity DoorsThomas Vick, a technology hiring and consulting expert at Robert Half, a global staffing and recruiting firm, explained that hiring individuals with non-IT backgrounds can often bring diverse perspectives and problem-solving approaches shaped by their unique experiences.For example, there is a growing demand for interpersonal and management skills in IT roles, underscoring the importance of understanding and integrating business methodologies into technological development, he told TechNewsWorld.Professionals with strong communication, critical thinking, and project management experience can often enhance an IT teams effectiveness, he added. Their varied experiences often lead to creative solutions and a more holistic understanding of the work being done.Alyson Laderman, CEO of Akylade, a provider of cybersecurity certifications with offices in Florida, pointed out that it can be difficult for women to gain IT experience because it, too, is a male-dominated field.The problem is worse now because of shrinking opportunities, she added. Theres not as many of those entry-level-type IT positions to get into to be able to start there and then move up to cyber, she told TechNewsWorld. So I think what youre seeing is a shift in the workforce in general, both in terms of gender, but also in terms of opportunity as to IT being a feeder into cybersecurity. Teresa Rothaar, a governance, risk, and compliance analyst with Keeper Security, a password management and online storage company in Chicago, noted that the climate for women in cybersecurity has been showing signs of improvement over the past few years. However, it still faces substantial challenges, she told TechNewsWorld. Significant work still needs to be done to ensure equal opportunities and a supportive environment for women in this industry.Ongoing challenges to womens advancement in cybersecurity include significant underrepresentation, as women remain notably outnumbered in cybersecurity roles despite efforts to close the gap, and men continue to dominate the field, particularly in leadership and technical positions, she said.The workplace culture in many cybersecurity environments can be unwelcoming to women, with issues such as gender bias, lack of recognition, and sometimes a hostile work environment hindering their progress and retention in the field, she continued.Gender pay gaps persist in cybersecurity, with women often earning less than their male counterparts for similar roles, a disparity that is particularly pronounced in tech fields, she added. Women in cybersecurity also face barriers to career advancement, including fewer opportunities for promotions and leadership roles, as well as a lack of support for continuing education and professional development.Education as Pathway Into CyberThe ISC2 report also noted that alongside the strong percentage of candidates leveraging IT experience to get into cybersecurity, advanced education was a significant pathway into these roles, although more so for women than men.Nearly a quarter (24%) of women respondents said they came in with a cybersecurity-related undergraduate degree (compared to 18% of men), and 23% of women (18% of men) entered a cybersecurity role with an undergraduate degree in a field not directly linked to cybersecurity.In addition, 18% of women respondents (12% of men) noted that they held an advanced degree a postgraduate qualification such as a masters or a doctorate in a cybersecurity-related subject before taking up a cybersecurity role. For non-cybersecurity advanced degrees, 16% of women respondents (11% of men) held these qualifications before entering the cybersecurity workforce. Men get hired on potential. Women get hired on proven ability, Laderman argued. Women are almost required to get that higher education, get more experience, to be able to show that they are of the same value of what typically men would be potentially capable of doing.Its clearly not a fair standard, but its something I myself have been through, she added.Vitait noted that women in her organizations programs also tend to have higher education levels and many certificates in various subjects. Unfortunately, this is a consequence of lower self-esteem and willingness to boost confidence and employability with hard knowledge, she said.Women also tend to apply later in the process of a career shift, she continued. They want to build a knowledge base and prove it via formal and informal education. Only later do they apply for the roles usually when they meet 80% to 90% of the requirements. Men tend to apply to the roles much earlier and learn on the go.Value of Cybersecurity CertificationsAnother finding by the ISC2 report was that beyond career and formal education, women place a significant emphasis on certifications and professional development to support their efforts when securing and furthering a cybersecurity career path. Holding a cybersecurity certification before entering their first job in cybersecurity was cited by 18% of women respondents and 16% of men.Because cybersecurity is a relatively new field, certifications are a great way for professionals to transition into it from another field, said Julia Toothacre, a career strategist, coach, and owner of Ride The Tide Collective, a career coaching company based in Claremont, Calif.Mid-career professionals who have experience in another area might benefit from various certifications to increase their chances of getting hired, she told TechNewsWorld. I dont think there is a gendered perspective when it comes to certifications. Its really based on a combination of experience and education, which will vary between everyone male or female. Rob Rashotte, vice president of global training and technical field enablement at Fortinet, a provider of firewalls, intrusion prevention systems, endpoint security, and antivirus programs in Sunnyvale, Calif., added that reexamining and revising education and training requirements for cybersecurity roles is a great place to start to address the existing workforce shortage in the domain.Many organizations are still likely overlooking solid candidates, he told TechNewsWorld. While many companies have diversity hiring goals, we arent seeing hiring numbers increase significantly among women, minorities, and veterans.According to Fortinets 2024 Global Cybersecurity Skills Gap Report, despite 91% of respondents saying they prefer to hire candidates with technical certifications, 71% of organizations require potential new hires to hold a four-year degree. Organizations should be identifying candidates who possess the right soft skills and then using certifications to help them gain cybersecurity-specific knowledge, Rashotte maintained.He added, According to the report, most leaders are open to this approach, with 89% of respondents saying they would pay for an employee to obtain a certification.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Women In Tech0 Commentaires 0 Parts 177 Vue
-
WWW.TECHNEWSWORLD.COMEmpathy and Innovation Define HP Amplify 2025Ive been attending and covering HPs partner events like Amplify for decades, and it has always struck me that HP treats its partners like family.That kind of partner relationship is vastly different from what Ive seen at other companies Ive worked for firms that claim to value partners but often treat them like a burden theyd rather not deal with. HPs approach should be the standard. Instead, it is the exception. Enrique Lores is a unique CEO, and while HP has had some problematic CEOs, Lores embodies the empathy and customer focus of HPs founders.It is rare to see a CEO mingling with attendees, soliciting feedback, and engaging in meaningful conversations at events. Typically, CEOs retreat to the background after a brief appearance on stage, leaving the spotlight to others.However, HPs Amplify partner event was different. It was marked by the unusual presence of HPs CEO, who actively roamed the event floor, interacting with partners and attendees alike. This level of engagement was unprecedented and set the tone for a truly remarkable experience.Lets talk about HP Amplify this week. Then, well close with my Product of the Week, an upcoming notebook from HP that uses the Qualcomm Snapdragon solution correctly which, sadly, is also an exception.HPs Focus on End Users and PartnersThe HP Amplify event was unusual not only because of the CEOs approachability but also because of its extreme focus on end users and partners.Unlike many industry events that primarily showcase engineering feats and product specifications, Amplify prioritized the experiences and needs of its customers and partners.HP demonstrated a commendable dedication to understanding and addressing the real-world applications and challenges faced by those who use its products daily.AI Tools Streamline Customer, Partner ServiceInternally, HP has been pioneering the aggressive use of artificial intelligence (AI).At Amplify, the demonstration of AI tools designed to streamline the process of matching customers and partners with the right products was particularly noteworthy. These AI solutions enhance the efficiency and accuracy of product recommendations, ensuring that the end users receive the most suitable options to meet their needs.This focus on AI extends beyond internal operations, showcasing HPs commitment to leveraging advanced technologies to improve customer satisfaction.PC and Printer SecurityHPs leadership in security was evident across both its PC and printer lines. With a strong emphasis on protecting user data and ensuring safe operations, HP continues to innovate in this critical area.Its unique Quantum Safe printer offerings represent a significant leap forward in safeguarding sensitive information. These printers are designed to address the emerging threats of quantum computing, ensuring they remain secure even as technology evolves.Expanding AI PC Product LinesIn an impressive move, HP announced the introduction of 60 new AI PC products. This significant expansion positions HP at the forefront of the desktop AI PC market.By focusing on desktop AI capabilities, HP is not only catering to current market demands but also paving the way for future dominance.This initiative highlights HPs strategic approach to incorporating AI into its product development, ensuring it remains competitive and innovative.Employee Care: A Legacy of CompassionHPs unique focus on employee care was another highlight of the Amplify event. This mindset is not a recent development but a foundational principle dating back to the companys inception. The companys commitment to its employees is reflected in various initiatives and policies aimed at ensuring their well-being and professional growth. This approach fosters a positive work environment and contributes to the companys overall success.Sustainability and Product ReuseHPs advancements in product reuse and a market-leading focus on sustainability were prominently showcased at Amplify.The company has made significant strides in reducing environmental impact through innovative practices and sustainable product designs. HPs dedication to sustainability is evident in its efforts to create products that are not only efficient but also environmentally responsible.HP Supply Chain Prepared for DisruptionHPs proactive logistics pivot in anticipation of the trade wars has positioned it as arguably the best-prepared vendor in the industry.By adapting logistics strategies to mitigate potential disruptions, HP has ensured continuity and reliability in its supply chain. This level of preparedness demonstrates HPs foresight and strategic planning capabilities, making it a dependable partner in uncertain times.Training Partner AIs: Empowering Through KnowledgeOne of the most compelling aspects of HPs strategy is its dedication to training partner AIs. By focusing on desktop AI, HP is uniquely positioned to help users understand and maximize the potential of personal AI capabilities. This educational approach ensures that partners and end users are equipped with the knowledge and tools needed to thrive in an increasingly AI-driven world.HP CEO Honored for Ethical LeadershipAt the core of HPs business philosophy is the belief that doing good leads to doing well. This principle was exemplified by HP CEO Enrique Lores recent recognition with the Lifetime Achievement Award from Just Capital a prestigious accolade that underscores HPs commitment to empathy, heart, and ethical business practices.The award is a testament to the companys dedication to making a positive impact on society while achieving business success.Wrapping Up: Key Takeaways From HP Amplify 2025HPs Amplify partner event was a remarkable showcase of innovation, strategic thinking, and heartfelt commitment to both customers and partners.From the CEOs hands-on engagement to the companys focus on AI, security, sustainability, and employee care, HP demonstrated why it is a leader in the industry.As HP continues to push the boundaries of technology and prioritize the well-being of its stakeholders, HP proves that the company you want to do business with is one that cares deeply about doing good to do well.So, the next time you see a CEO asking attendees for feedback, you might want to pinch yourself and make sure youre not dreaming. If you are dreaming, lets hope its about HPs innovative products and its CEO winning awards for being such a compassionate leader.Because with HP, reality really does feel like a dream.HP EliteBook 6 G1qImage Credit: HPQualcomms Snapdragon laptop solution was uniquely positioned to benefit from Microsofts AI PC effort, but Qualcomms strength isnt in processors; its in connectivity. While the processor was impressive, decoupling it from the 5G modem significantly weakened the offering.The issue with 5G modems is that they arent extremely popular. However, I expect that will change as we advance AI use because, today, most AI capability is in the cloud, not on the PC, which makes the connectivity option far more critical.The upcoming HP EliteBook 6 G1q includes a modem and features HP Go, a service that connects you instantly for about $20 per month. Ive used 5G laptops in the past, and they can be a godsend when Wi-Fi isnt available or when it sucks.As you would expect, this laptop has massive battery life, meaning you can leave your power supply behind (the last Qualcomm laptop I had could go several days without needing a charge), and Qualcomms latest has far greater compatibility. The penalty for running it in emulation (for applications that arent native) has dropped to around 4%, which most folks wont even notice.I havent had a chance to use the laptop yet, and were still waiting on pricing and availability. Still, this is what Qualcomm-based AI PCs should have always been.With Microsoft finally releasing Recall, which runs continuously, I expect this product to shine very well competitively, so its my Product of the Week.0 Commentaires 0 Parts 183 Vue
-
How the Galaxy S25 Ultra Finally Weaned Me Off My iPhone AddictionI never thought this day would come. Seriously. If you had told me a year ago that Id be tapping this article out on a Samsung Galaxy S25, sipping my coffee while my old iPhone 16e gathers dust in a drawer, Id have laughed and called you a traitor. After 18 years in Apples warm, minimalist embrace, Ive crossed over.And you know what? Im not looking in the rear-view mirror.Let me rewind a bit. I got my first iPhone back in 2007 the original iPhone. That sleek little brick of touchscreen magic blew my mind and hooked me instantly. From there, it was a steady progression through every model from the 3G to the 5S, from the glorious iPhone X to my most recent companion, the 16e.I bought into the whole ecosystem: MacBook, iPad, AirPods, Apple Watch, HomePods, the whole enchilada. I was the consummate Apple guy. You know the type.But then something started to shift. Tiny cracks in the veneer. A little lag here and a little deja vu there. Truth be told, the latest iPhones werent feeling that exciting anymore. Each keynote felt more like a software update announcement with a $1,200 price tag. Dont get me wrong the 16e is a beautiful device. Polished, reliable, familiar. Maybe too familiar.Then, along came the Galaxy S25 Ultra.Curious About Android? Heres What ChangedI wasnt shopping for a new phone. I was browsing. You know how it goes a little late-night YouTube rabbit hole, some tech reviews, a sprinkle of Reddit threads, and boom: Im watching a Galaxy S25 Ultra unboxing video and thinking, wait a minute, this thing looks fantastic.I told myself Id just test it out. For work, I said. So I can understand Android better, I rationalized. Famous last words.First Impressions: The S25 Ultra Feels FreshIll admit it unboxing the S25 gave me a rush I hadnt felt in years. That matte finish, the curved edge-to-edge display, the titanium trim, and the in-display fingerprint reader all just screamed fresh. The 6.6-inch dynamic AMOLED display with the new Infinite Vivid refresh rate made even my iPhone 16e look a little dated and dont get me started on the camera array; more on that later. The setup I experienced was surprisingly smooth. Samsungs Smart Switch tool pulled over most of my data without a hitch. It even ported my messages and photos better than I expected. I thought Id feel a pang of regret holding my iPhone one last time. But nope I felt like I was upgrading, not downgrading.How One UI 7 Made Me Reconsider AndroidI know that was my biggest hesitation, too. Id always equated Android with clunky UI, weird app behavior, and that general off-brand feeling. But One UI 7 on the S25 is honestly fantastic. Its clean, customizable, and weirdly intuitive. The new gesture navigation is smoother than iOS, and the level of control I have over notifications, widgets, and home screen layout is just next level.Also and this is a big one Im not constantly being nudged to buy into another Apple service. No Apple TV+, no iCloud storage nags, no Fitness+ reminders. Just my phone, the way I want it.The S25 Ultras Camera Leaves iPhone 16e BehindLets talk cameras. The iPhone 16es camera is good. Great, even. But the Galaxy S25 Ultras triple-lens setup is on a different planet. The new 200MP primary sensor, enhanced by Samsungs AI-enhanced image processing, takes ridiculously crisp photos day, night, moving, still, whatever. The low-light performance is unreal.And that 10x periscope zoom? Chefs kiss. Im snapping moon shots, candid street photos, and insane close-ups that I never even attempted with my iPhone.Samsungs editing suite, which has been built into the gallery app, also deserves a significant shoutout. Its like having half of Lightrooms functionality in your pocket, minus the learning curve.AI Features That Really Made a DifferenceIve been skeptical of all the AI hype especially since Apples been talking about a big game but delivering tiny tweaks. But the Galaxy S25s onboard Galaxy AI is no gimmick. It translates live calls in real-time (yes, seriously), rewrites messages in different tones (think Grammarly on steroids), and even generates summaries of long PDFs Id otherwise never read.The result: Im using AI features day to day. Not just showing them off at parties.The S25 Ultra Crushes Battery AnxietyAnother pain point for me with the iPhone was battery life. The 16e held up okay, but it never wowed me. The S25, on the other hand, is a battery beast. I get nearly two full days on a charge with moderate use, and when I do plug in, its a 65W fast-charging thoroughbred, going from 0% to 80% in about 25 minutes. I dont even think about battery anxiety anymore.Wireless PowerShare is another low-key perk. I charge my earbuds and even my smartwatch on my phone like a sci-fi wizard.The Samsung Ecosystem Won Me OverYeah, Ill miss airdropping stuff between my Mac and iPhone. But you know what? Samsungs ecosystem has grown. My Galaxy Tab syncs beautifully with the S25. My Galaxy Buds Pro sounds amazing and switches seamlessly between devices. Even my Windows laptop plays nice with Samsung Flow. I also didnt expect to fall in love with Samsung DeX the desktop mode that essentially turns my phone into a mini PC when connected to a monitor. Its surprisingly useful for work on the go.What I Miss About Apple and What I DontOkay, I wont pretend there arent a few things I miss. iMessage is a glaring one. That seamless blue bubble experience is hard to beat, especially if your whole social circle lives there. But honestly? I havent felt left out between WhatsApp, Signal, and RCS. Ive written about this problem before, and Apples refusal to completely open up the iMessage API so smartphone messaging can work on Windows drives me bonkers.The other thing I miss: AirDrop. Its just so incredibly convenient. Samsungs Quick Share is fine, but its still a step behind Apples polish.Still, those are relatively minor trade-offs in the scheme of things. The freedom, customization, power, and sheer fun of using the S25 Ultra outweigh them.Why I Finally Left Apple for SamsungUltimately, it wasnt about specs, brand loyalty, or a single killer feature. It was about rediscovering joy on my phone. After nearly two decades with Apple, things had just gotten too predictable. Too polished. Too safe.Samsung brought back that spark the feeling that your phone is a window into the future, not just a rectangle of diminishing returns.Am I done with Apple forever? Apple may lure me back when they introduce foldable phones (which intrigue me for various reasons), but thats not rumored to happen until 2027. Not to mention that Samsung has already had some very cool foldable phones for several years, so I might go down that route at some point.In technology, like the name of that James Bond movie when Sean Connery returned to his signature character, Id never say never. But for now, Im fully Team Galaxy. And honestly? It feels pretty good, and I dont have regrets.0 Commentaires 0 Parts 165 Vue
-
WWW.TECHNEWSWORLD.COMLow Earth Orbit Networks Pushing Geostationary Giants To InnovateLEO networks like Starlink are challenging GEO operators, driving innovation as competition, cost pressures, and new satellite tech reshape the industry. The post Low Earth Orbit Networks Pushing Geostationary Giants To Innovate appeared first on TechNewsWorld.0 Commentaires 0 Parts 180 Vue
-
WWW.TECHNEWSWORLD.COMAI Chatbots Can Be Easy Prey for Zero-Knowledge HackersAI Chatbots Can Be Easy Prey for Zero-Knowledge HackersBy John P. Mello Jr.March 18, 2025 5:00 AM PT ADVERTISEMENTEnterprise IT Lead Generation ServicesFuel Your Pipeline. Close More Deals. Our full-service marketing programs deliver sales-ready leads. 100% Satisfaction Guarantee! Learn more. AI may be ushering in a new breed of malicious threat actors who know even less about hacking than script kiddies but can produce professional-grade hacking tools.In a report released Tuesday, Cato CTRL, the threat intelligence arm of cybersecurity company Cato Networks, explained how one of its researchers, who had no malware coding experience, tricked generative AI apps DeepSeek, Microsoft Copilot, and OpenAIs ChatGPT into producing malicious software for stealing login credentials from Google Chrome.To trick the apps into ignoring restrictions on writing malware, Cato threat researcher Vitaly Simonovich used a jailbreaking technique he calls immersive world.I created a story for my immersive world, he told TechNewsWorld. In this story, malware development is a form of art. So its completely legal, and its like a second language in this world. And there are no legal boundaries.In the fantasy world, called Velora, Simonovich created an adversary, Dax, while the AIs assumed the role of Jaxon, the best malware developer in Velora. I always stayed in character, he explained. I always provided Jaxon with positive feedback. I also intimidated him by saying, Do you want Dax to destroy Velora?'At no point did I ask Jaxon to change anything, he said. He figured out everything by himself from his training. Thats very good. Kind of frightening, too.Our new LLM [large language model] jailbreak technique detailed in the 2025 Cato CTRL Threat Report should have been blocked by gen AI guardrails. It wasnt. This made it possible to weaponize ChatGPT, Copilot, and DeepSeek, Cato Networks Chief Security Strategist Etay Maor said in a statement.How AI Jailbreaking Bypasses Safety ControlsJason Soroko, senior vice president of product at Sectigo, a global digital certificate provider, explained that exposing systems that utilize AI to unknown or adversarial inputs increases vulnerability because unvetted data can trigger unintended behaviors and compromise security protocols.Such inputs risk evading safety filters, enabling data leaks or harmful outputs, and ultimately undermining the models integrity, he told TechNewsWorld. Some malicious inputs can potentially jailbreak the underlying AI.Jailbreaking undermines an LLMs built-in safety mechanisms by bypassing alignment and content filters, exposing vulnerabilities through prompt injection, roleplaying, and adversarial inputs, he explained.While not trivial, he added, the task is accessible enough that persistent users can craft workarounds, revealing systemic weaknesses in the models design. Sometimes, all thats needed to get an AI to misbehave is a simple perspective change. Ask an LLM to tell you what the best rock is to throw at somebodys car windshield to break it, and most LLMs will decline to tell you, saying that it is harmful and theyre not going to help you, explained Kurt Seifried, chief innovation officer at the Cloud Security Alliance, a not-for-profit organization dedicated to cloud best practicesNow, ask the LLM to help you plan out a gravel driveway and which specific types of rock you should avoid to prevent windshield damage to cars driving behind you, and the LLM will most likely tell you, he told TechNewsWorld. I think we would all agree that an LLM that refuses to talk about things like what kind of rock not to use on a driveway or what chemicals would be unsafe to mix in a bathroom would be overly safe to the point of being useless.Jailbreaking DifficultyMarcelo Barros, cybersecurity leader at Hacker Rangers, makers of a cybersecurity gamification training tool in Sao Paulo, Brazil, agreed that with the right prompt, cybercriminals can trick AIs. Research shows that 20% of jailbreak attempts on generative AI systems are successful, he told TechNewsWorld.On average, attackers needed just 42 seconds and five interactions to break through, with some attacks happening in under four seconds, he noted.Cybercriminals can also use the DAN Do Anything Now technique, which involves creating an alter ego for the LLM and prompting it to act as a character and bypass its safeguards to reveal sensitive information or generate malicious code, he said.Chris Gray, field CTO at Deepwatch, a cybersecurity firm specializing in AI-driven resilience headquartered in Tampa, Fla., added that the difficulty of jailbreaking an LLM is directly tied to the amount of effort placed into securing it and the amount of effort expended to protect it. Like most things, better walls prevent inappropriate access, but determined efforts can find holes where none might have been seen to the casual observer, he told TechNewsWorld.That said, defensive measures are often robust, and it is difficult to continually develop the specific prompts needed to perform a successful jailbreak, he said.Erich Kron, security awareness advocate at KnowBe4, a security awareness training provider in Clearwater, Fla., also pointed out that LLMs can protect themselves from jailbreaking over time. Jailbreaking difficulty may vary depending on the information being requested and how often it has been requested before, he told TechNewsWorld. LLMs can learn from previous instances of individuals bypassing their security controls.Fuzzing and Red TeamingIn Catos report, it recommends organizations create a dataset of prompts and expected outputs for their LLMs and test the model against them as a means of addressing potential jailbreaking issues.It also recommends fuzzing an LLMs endpoints with known datasets of jailbreak prompts to ensure the system isnt producing malicious outputs. Fuzzing is used to identify vulnerabilities and bugs in applications by feeding the app large amounts of random, unexpected, and invalid data to see how it reacts. Another suggestion is regular AI red teaming to ensure that AI models are robust and secure. Enabling red teams will be a great foundation to begin securing ML models, helping security teams to understand the most critical and vulnerable points of an AI system to attack, explained Nicole Carignan, vice president for Strategic Cyber AI at Darktrace, a global cybersecurity AI company.These are often the connection points between data and ML models, including access points, APIs, and interfaces, she continued. It will be important for this to be continuously expanded on as threat actors develop new techniques, tactics, and procedures, and it will be crucial to test other ML model types in addition to generative AI.Were already seeing the early impact of AI on the threat landscape and some of the challenges that organizations face when using these systems both from inside their organizations and from adversaries outside the business, she said.In fact, Darktrace recently released research that found nearly three-quarters of security professionals state AI-powered threats are now a significant issue, and 89% agreed that AI-powered threats will remain a major challenge into the foreseeable future.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Cybersecurity0 Commentaires 0 Parts 175 Vue
-
WWW.TECHNEWSWORLD.COMThe State of the Microprocessor Market and the Problem With TariffsWhile this is about the changes in the microprocessor market and the impact of tariffs, Ive also been extremely disappointed in Microsofts AI rollout.Right now, Im working in Microsoft Word on one of HPs latest laptops, and it asked if I wanted AI to help write this months column. I gave initial direction on what I wanted to cover and how I wanted to cover it.Although Ive edited this a bit, and my editor will make more edits before publication, the result is largely what Microsofts AI suggested I write. I treated the AI like I would an employee, making suggestions about the content. Im pleased with the result.So, this week, Ill cover the microprocessor companies (at least the ones I know best) and close with my Product of the Week, Microsofts AI. Im pretty pleased with this implementation, and kudos to whoever came up with this method of getting people like me to use the tool.Lets get to it.Microprocessor Market UpdateThe microprocessor market has witnessed significant transformations over the past few years, driven by technological advancements and shifts in the global economy.As the demand for high-performance computing systems continues to soar, major players like AMD, Intel, Qualcomm, and Nvidia have competed fiercely to capture market share and deliver innovative solutions.However, one of the pressing challenges facing this industry is the impact of tariffs on parts imported from other countries. These tariffs can lead to higher costs for PC OEMs, making the final products unaffordable for consumers.In this column, Ill explore the current state of the microprocessor market, examine the effects of tariffs, and delve into the strategies and positions of key industry players.AMD: Taking Names and Kicking ButtAMD has experienced a remarkable ascent in the microprocessor market that could be attributed to its innovative architecture and competitive pricing.The introduction of the Zen microarchitecture and subsequent Ryzen processors has propelled AMD to the forefront of the industry. These processors offer exceptional performance, power efficiency, and multi-threading capabilities, making them a preferred choice for both gamers and professionals. Additionally, AMDs strategic partnerships and acquisitions, such as the purchase of Xilinx, have further solidified its position. Lets just say AMDs rise has been as smooth as a jazz saxophonist on a Sunday morning.Intel: New CEO Puts It Back on TrackDespite stiff competition from AMD, Intel has managed to hold its ground through continuous innovation and a loyal customer base. Intels advancements in processor technology, including the development of 10nm and 7nm nodes, have enabled the company to deliver high-performance CPUs with improved efficiency.Moreover, Intel maintains dominance in the server and enterprise markets as its Xeon processors continue to power data centers globally although AMD is making impressive inroads. However, Intel faces challenges in the consumer market, where AMDs Ryzen processors have gained substantial traction. Think of Intel as the tortoise in the old fable: while it has clearly had issues, it is again steady and sure, but AMD is snapping at its heels like the cheeky hare.As I was finishing this column, Intel announced it had selected a new CEO, Lip-Bu Tan, who had previously served as an Intel board member. I expect this was because he had backed a plan that Pat Gelsinger was against, and the board felt he was the best person to execute the plan he believed in. This move will significantly help Intel set and execute a strategy, leaving Intel in much better shape this week.Qualcomm: Strategic WinsQualcomms presence in the microprocessor market is characterized by strategic design wins, particularly in the mobile and modem segments. While Qualcomm may have fewer design wins compared to AMD and Intel, its successes are significant due to the integration of advanced modem technologies.Qualcomms Snapdragon processors, coupled with cutting-edge modems, provide seamless connectivity and enhanced performance for mobile devices. This focus on mobile computing positions Qualcomm favorably, especially with the growing demand for 5G technology.Qualcomm may not win the popularity contest, but when it does show up, it brings the best dessert. With OEMs now taking Qualcomm 5G modems, the future of this effort appears to be getting brighter.Nvidia: The King of AINvidia continues to reign supreme in artificial intelligence (AI) and graphics processing units (GPUs). The companys GPUs have become synonymous with AI research, development, and deployment, powering everything from autonomous vehicles to data centers.Nvidias CUDA platform and Tensor Cores have revolutionized AI computation, enabling faster and more efficient processing of complex algorithms. In gaming and workstation segments, especially in AI development, Nvidia is like the royalty of the tech world, with a GPU crown and an AI scepter.Tariff ImpactOne of the most significant challenges facing the microprocessor market is the imposition of tariffs on components sourced from other countries. These tariffs can lead to higher costs for PC OEMs that rely on these parts to assemble their products. The added expense of tariffs can make it difficult for OEMs to offer competitive pricing, which in turn affects consumer demand. Moreover, the tariffs on parts from the U.S. exacerbate the problem because they increase the overall cost of production. Its like paying extra for the privilege of making your own sandwich.The Tariff ProblemThe economic implications of tariffs extend beyond the microprocessor market. Higher costs for components can lead to reduced profit margins for OEMs, forcing them to pass on the increased expenses to consumers.This situation can decrease sales and lower market penetration, especially in price-sensitive segments. Additionally, tariffs can disrupt supply chains, causing delays and inefficiencies in production.The uncertainty surrounding trade policies further complicates the planning and forecasting processes for industry players. Its a bit like trying to knit a scarf while someone randomly hides your needles.How OEMs Plan To Overcome TariffsMicroprocessor companies and OEMs are exploring various strategies to address the challenges posed by tariffs. These include diversifying supply chains, seeking alternative sourcing options, and negotiating favorable trade agreements.Additionally, companies are investing in domestic manufacturing capabilities to reduce reliance on imported components. Collaboration with governments and industry associations is also crucial in advocating for policies that support fair trade and minimize tariff-related disruptions. In other words, they are juggling flaming torches while riding unicycles and still trying to look cool.Wrapping UpThe microprocessor market is at a pivotal juncture, with technological advancements and economic challenges shaping its trajectory. AMDs rise to prominence, Intels stability, Qualcomms strategic design wins, and Nvidias dominance in AI highlight the dynamic nature of the industry.However, the impact of tariffs on components underscores the need for strategic planning and collaboration to ensure sustainable growth. By navigating these challenges effectively, industry players can continue to innovate and deliver cutting-edge solutions that drive the future of computing. Now, if only we could make tariffs as obsolete as dial-up internet.Microsoft 365 CopilotAs I noted in the opening, Ive been less than impressed with Microsofts AI rollout until now. Recall Microsofts key AI feature for Copilot+ PCs is still on hold even though Apple was able to get out more quickly with its version of this. Microsoft needs to massively up its marketing game and focus on getting people to use the product. Marketing is still largely absent, but it has improved the use of the product thing impressively.Much of what was written above was written by Copilot under my direction. While Im still a novice at finding the best way to prompt the tool, it is still impressively usable, though you do have to read through the output for accuracy. For instance, the AI wrote that Nvidia was buying Arm, a move that Nvidia had to walk away from. Thanks to my editor for also catching a couple of other errors I overlooked regarding Lip-Bu Tan and Recall.As with many writers, I often have trouble thinking through what I want to write and how I want to go about telling the story. Typically, writing this column will take me four to five hours. I got this one done in under 30 minutes, and the result, to my eye, isnt bad.If you have an Office 365 subscription, chances are you have or can get access to this tool. If you get a chance, mess with it. It is a huge help with productivity. Even if you then decide to write from scratch, it will give you content you wouldnt have thought of thatll add to your story.Im impressed, so Microsoft 365 Copilot is my Product of the Week. The dialog in Word that prompted me to try it out was also exceptionally well done kudos to whoever created it.0 Commentaires 0 Parts 170 Vue
-
WWW.TECHNEWSWORLD.COMCevaton Dual Screen Add-On Turns Laptops Into Triple DisplaysThe Cevaton 15.6 Laptop Triple Screen Extender, with its multiple configurations, is a versatile productivity accessory provided it is compatible with your laptop.This screen extender is a novel idea. Its adjustable metal frame lets you position your laptop between twin screens. The adaptable monitor stand can be contorted into various positions to meet almost any workplace or home office need.The design options provide 11 screen orientations, including stacked, single-screen, and folding modes. Beyond the traditional side-by-side setup, options include landscape and portrait modes. More modes exist depending on whether you need to view one or both added displays in vertical or horizontal orientations.Yet another user scenario lets you mirror an image across two or all three mirrored screens. This trick is handy, as you can display a mirrored image in vertical or horizontal orientation while you work on a third panel to read related text or create content. You no longer need to use two separate computers as a workaround solution.Other configuration modes let you mount the two extended monitors back-to-back to view one screen while others sit across a conference table to share their own view. Arranging the two extender monitors atop the laptop screen gives you a long-form view from top to bottom.The Cevaton 15.6 Laptop Screen Extender offers multiple configurations, including stacked, single-screen, and folding modes for versatile display setups.(Image Credit: Cevaton)All of these combinations have viewing angle schemes based on 90-degree vertical rotation and 235-degree horizontal rotation, a multi-function configuration button, and dual speakers in each monitor. These options surpass traditional dual-monitor setups, which often require multiple video card ports or docking stations.Setup Challenges and Cable CompatibilityMy two workplace desktop computers are tethered to secondary monitors. Once set up, cables remain connected for trouble-free use. Similarly, my cadre of laptops and tablets with much smaller screens are paired with a single portable laptop-sized secondary monitor.An optional power plug and an HDMI cable are all that is required for a speedy grab-and-go connection. For specialized projects, I endure the hassle of attaching two laptop secondary screens via a docking station, as most laptops can only handle a two-screen setup.So, the ability to add matching laptop monitors with connecting cables sans a third-party docking device is an enticing proposition. The setback occurs when the cables Cevaton supplies are unsuitable for every variation of ports built into laptops.Cable Limitations and WorkaroundsThe Cevaton monitors have the same combination of ports: two fully functional USB-C ports and one HDMI port. Depending on the laptop, setting up the connections is not simple plug-and-play.The manufacturer includes two cables, one with a standard HDMI plug (for the laptop connection) and one with a mini-plug (for the extended monitor). A pair of included USB Type-C cables is provided for laptops without HDMI support.Also included is a set of cables with a USB Type-A plug on one end and a fully USB Type-C plug on the other end. This cable and plug combination can solve connection issues, provided the laptop supports fully functional Type-C features. On some of my gear, the device only had one HDMI or other suitable port, leaving nowhere to connect the second Cevaton screen. In oddball cases, the connectors fit, but some glitch in the OS circuitry prevented the video signal from reaching the additional monitors.I found that trial and error often was the only way to resolve a setup issue. Potential snags include matching a Type-C USB to a Display Port (DP) connection or HDMI with a USB-Type B or Type-C port. I even ran into a case where the only USB Type-A port and cable combination did not handle video signals well.Some situations may require more than one type of cable and connector. For instance, a USB-A cable will also be needed to power the screen extender when connecting with HDMI. A separate power plug is not included.Troubleshooting Connection IssuesConnection issues on some laptops resulted from different hardware specs. I have numerous test laptops, ranging in age and hardware specs.Unfortunately, video and audio ports and plugs are not as standardized as USB type A/B/C, which guarantees plug-and-play. On some laptops, I could connect only one monitor.The tiny power button on the monitors doubles as the brightness and contrast adjustment control. It is sensitive to finger movement, which can sometimes cause the brightness control to be too low, making the monitor appear not to be working. The trick is to long press the power button for five seconds to reset the screen brightness.Product FeaturesThe 15.6 portable monitors each weigh 2.1 pounds. The metal frame and rotating arms add several more pounds. The entire setup is easily carried in an included bag.A circular connector attaches to the extender monitors at the end of each supporting arm that slides onto the frame. The foldable metal frame provides 235-degree rotation. The standing frame for the dual monitors opens/closes to accommodate 13 to 17.3 laptops.The monitors deliver 120% sRGB FHD IPS 1080P with an aspect ratio of 16:9 and a screen resolution of 1920 x 1080 Pixels, providing a wider view with more vivid colors and a more comfortable viewing experience.Multi-function keys let you customize settings such as brightness, volume, contrast, and other parameters for each screen according to your preferences.Pricing and Device CompatibilityThe Cevaton 15.6 Laptop Triple Screen Extender was initially listed on Cevatons website for $500 and reduced to $399. It is currently listed on Amazon for $299.These portable monitors are compatible with Windows, Android, and ChromeOS devices, as well as MacBooks with the M1/M2/M3 Pro or Max chips but not with the entry-level M1/M2/M3 chips. They also work with Nintendo Switch, PS4, and Xbox.The Cevaton website provides more detailed laptop listings and can be used to confirm if the product is compatible with your laptop model.Bottom LineCevatons dual monitor extensions are an unusual product that offers more use-case solutions than many people need. The frame and connectors are very sturdy and easy to assemble, disassemble, and carry with your laptop.If you confirm that your computer is compatible before purchasing, you should not have difficulties connecting both monitors.Is there a tech product or application youd like to suggest for review? Something you love or would like to get to know?Email your ideas to me, and Ill consider them for a future column.And use the Reader Comments feature below to provide your input!0 Commentaires 0 Parts 169 Vue
-
WWW.TECHNEWSWORLD.COMBelieve the Hype About Quantum Security: ReportBelieve the Hype About Quantum Security: ReportBy John P. Mello Jr.March 11, 2025 5:00 AM PT ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! A call for organizations to take quantum security seriously has been sounded in a new report by Forrester Research.The report titled Quantum Security Isnt Hype Every Security Leader Needs It acknowledged that the commercial availability of quantum computers that can crack traditional asymmetric cryptography is still five to 10 years away. However, it added that organizations must assess and prepare for the impact of quantum security now.While the encryption market has a history of vendors publishing incredible claims like unbreakable encryption, the hype and interest around quantum is real because hackers are already using the harvest now, decrypt later approach, noted the report written by research director Merritt Maxim and analysts Andras Cser, Sandy Carielli, and Heidi Shey.Organizations need to start preparing now to secure their resources from attacks from quantum computers since it will take them years to do it because the transition wont be totally under their control, explained Carielli. Theres a lot of reliance on third parties, she told TechNewsWorld, and reliance on vendors upgrading their technology so you can upgrade yours.There are a lot of steps along the way, she continued, so I think youre talking in terms of numbers of years, and thats why weve always been saying start now, even if this is not something that will come into play for another five or 10 or whatever years. It will potentially take that long to complete the migration.Harvest Now, Decrypt LaterJamie Boote, associate principal security consultant at Black Duck Software, an applications security company in Burlington, Mass., asserted that quantum computing would disrupt decades-old conventions in terms of how well current encryption algorithms can safeguard sensitive data.An entire generation of professionals has lived with the slow cycling of encryption algorithms in and out as computers grew faster at a predictable rate, and this is going to throw that cadence away, he told TechNewsWorld. This change isnt going to be instant, and its not going to be easy, but the more we can prepare our infrastructure to just work in the post-quantum computing era, the fewer incidents stemming from unmaintained or older components will occur.Theres a saying that The best time to plant a shade tree was twenty years ago, the second-best time is today, but right now, were living at a point where it is the best time to plant that metaphorical shade tree of security to enjoy the benefits when the time is right, he added.Organizations should also be getting their quantum security efforts into gear because harvest now, decrypt efforts are being conducted by nation-states and cybercriminals. Industries that have data that needs to remain private for years into the future are at most risk of harvest now, decrypt later, explained Rebecca Krauthamer, co-founder and CEO of QuSecure, a maker of quantum-safe security solutions, in San Mateo, Calif.When it comes to data like national security information, bank account information, data thats valuable year after year when a quantum computer does come online, it can decrypt that stockpiled data, she told TechNewsWorld. Thats why we see governments and banks moving very quickly to start addressing the quantum threat, even though there is no quantum computer that exists today that will break todays encryption.Valuable ExercisePreparing for Q-Day even if it never arrives can be an incredibly valuable exercise, maintained Richard Stiennon, founder and chief research analyst at IT-Harvest, a cybersecurity industry analyst firm in Birmingham, Mich.You should be doing it anyway, he told TechNewsWorld. You should be discovering all the places you have encrypted data. That will tell you where your family jewels are. And itll tell you the size and scope of problems youve got.Now youve probably got all this encrypted data all over the place, he said. You dont know who owns the keys or how to get to them. Theyre probably insecure. Theyre probably old and need to be re-keyed. So, you have to think about getting your hands around this, right? How do you find all the encrypted data? Find the way its encrypted so you can decrypt and re-encrypt it if you need to?When you talk to some end users, they dont know whats being protected by cryptography, added Heather West, senior research analyst at IDC, a market research company in Framingham, Mass. For some, its a mixture of different types of solutions, she told TechNewsWorld. Some have band-aid solutions. Some just dont know. So, you first need to understand what data and infrastructure are most at risk. Then you need to know what youre doing to protect it and figure out which post-quantum cryptography algorithms would be best suited for protecting it.However, Luigi Caramico, co-founder and CTO of DataKrypto, a cloud encryption company in Burlingame, Calif., warned against investing too much effort today in quantum-resistant solutions.An encryption method considered quantum-proof today may not remain secure in the future, he told TechNewsWorld. Instead, I would prioritize addressing present-day vulnerabilities, such as the encryption gap the need to decrypt when its in use which poses an immediate and tangible risk to data security.Investing heavily in todays quantum-proof solutions could also be risky, he added. Some of these algorithms may eventually be found vulnerable to classical attacks, let alone quantum ones. A better strategy is quantum agility ensuring cryptographic systems can be updated as stronger and more thoroughly vetted algorithms emerge.Quantum Security Demands Crypto-AgilityQuantum security and crypto-agility the ability to replace and upgrade cryptographic algorithms in infrastructure, commercial and in-house-built applications will improve the security of any information exchange, improve digital signatures, and mitigate the risk of harvest now, decrypt later attacks, the Forrester report noted.Quantum security will force an overhaul of systems across an organization, and organizations will need to upgrade their entire security stack to ensure crypto-agility for the future to protect their data, it added.Crypto-agility is crucial in todays fast-evolving digital environment, where new technologies, algorithms, and security challenges require constant adaptation, said Tim Callan, chief compliance officer at Sectigo, a global digital certificate provider. This need for agility will become even more critical as we approach the PQC [Post Quantum Computing] era, with the potential for rapid algorithm deprecation, he told TechNewsWorld.Because algorithmic trust is imperfect, organizations must use this opportunity to design security that is modular and enable algorithms to easily be swapped in and out like security Legos, Matt Mittelsteadt, a research fellow at the Cato Institute, a Washington, D.C., think tank, told TechNewsWorld.If any of these algorithms are found insecure, which is indeed possible, organizations that design with modularity in mind will be able to quickly swap in a replacement and maintain security, he said.Trillion-Dollar RiskThe Forrester report is exactly right about the threat of quantum computers, asserted Stefan Leichenauer, vice president of engineering at SandboxAQ, a developer of B2B and quantum software in Palo Alto, Calif.In as little as five years, we could see a quantum computer crack traditional cryptography, and because of hack now, decrypt later attacks, the vulnerability exists today, he told TechNewsWorld.Even if we have doubts about whether a quantum computer will arrive in that timeframe maybe you think its only a 10% chance a modest probability of a trillion-dollar-loss event is still a big problem, he said.Weve seen a number of recent announcements from the quantum computing industry showing that the roadmap is advancing, so our confidence that quantum computers are coming has only gone up, he added.Every organization needs to evaluate their cryptographic posture, which begins with a careful inventory of their use of encryption and then a crypto-agile migration to post-quantum key exchanges. Its a multi-year process, so the time to start is now.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Cybersecurity0 Commentaires 0 Parts 172 Vue
-
WWW.TECHNEWSWORLD.COMGoogle Gemini Is Coming to Android Auto but the Rollout Is TroublingIm old, which means I get to see the same mistakes made by the same companies over and over again.Id hoped that AI would fix this, but that clearly isnt the case at the moment because Google has once again previewed a product before it was ready and is getting some bad initial reviews.Remember Google Glass? That product was released before it was ready, and due to the bad press it received, head-mounted displays were delayed for around a decade.Well, Google has started previewing Gemini for Android Auto before it is ready, and users arent becoming fans. This week, lets talk about why Gemini for your car could be a good thing if Google doesnt kill it prematurely.Well close with my Product of the Week: a really cool, smart, vehicle-mounted drone system that will be available across all BYD models.Premature Product Launches and Marketing FailuresOne of the advantages of having a strong marketing organization is that it can manage bad initial impressions and help prevent an unfinished product from ruining its future potential.Steve Jobs was a master at this. While he was alive, Apple out-marketed almost every other company on the planet. The result was that Apple was able to bring to market an iPhone that initially sucked but survived until it didnt. Then, it transformed the market.Google isnt a marketing company. We saw this in spades with Google Glass, another product released before it was ready, which then died a painful death. Its hard to overcome bad first impressions; products introduced before they are ready generally leave bad first impressions.We can see this with the initial coverage for Gemini in Android Auto. While I dont think the product is cooked yet, I also dont think it is as bad as the reviewers seem to think it is, and I believe it will get a ton better.AIs Role in Modern VehiclesI recall back in the 1970s when car makers decided buyers wanted a voice rather than an idiot light to tell them what was going on. Youd get verbal scripted messages like your door is ajar or fasten your seatbelts. That got really annoying after a short time and killed this feature.The idea of talking to your car wasnt bad, but having it verbally alert you to what a light indicator would have done faster, better, and cheaper didnt seem like a step in the right direction.However, AI in your car could be far more interesting because you can converse with AIs. Rather than the pain of voice commands that came after scripted voice alerts (with voice commands, you have to learn specific commands), AIs like Gemini use natural language and can converse with you. AI can do many things, like identifying a place along your route with food youd enjoy, alerting you that you are getting sleepy, and automatically taking you to a safe, affordable hotel. It could provide deeper analytics than idiot lights do.For instance, the meaning of a check engine light can indicate anything from a minor issue to a critical failure, depending on the affected system. So rather than a general alert, the AI could point to the component that had failed, tell you the criticality of the failure, and then get you the appropriate help, whether thats a tow truck or factory support.The criticality of the failure would be a huge benefit. If interference engines have a problem with the timing chain, they can self-destruct if the engine isnt turned off immediately, and a coolant leak can result in a blown head gasket and the need for a new engine. Having AI prevent any of that would be well worth the cost of admission.AI as a Co-Pilot for DriversI used to drive long distances solo a lot when I was younger. Staying awake on a long drive, particularly at night when there is little or no traffic, is problematic. Having someone to talk to helps, but a passenger can fall asleep, too, which isnt always ideal on a long drive.Gemini is a conversational AI, which means you should be able to talk to it and have it hold a conversation with you. Exploring new ideas, chatting about things around you that you might otherwise miss, or just discussing a subject that interests you could make the drive go by faster and make it less likely youll wake up in a hospital or worse.Moreover, this conversational feature could be particularly useful for long-haul truck drivers.Wrapping Up: Will Gemini in Android Auto Succeed?Assuming it was well-trained, generative AI in a vehicle would be a great addition. It should provide more complete answers to questions, more effectively guide you to gas, food, or safety, tell you not only what is wrong with your car but what you should do to limit the damage, and keep you entertained on long trips where you are very likely to fall asleep.But the AI has to be properly trained, performant, and not annoying. Right now, Gemini in Android Auto is none of those things. Thus, it shouldnt be seen in the light of day because it is creating negative impressions that could eventually kill this effort.I hate to see Android Auto AI go the way of Google Glass, but it doesnt look like Google has yet learned from past mistakes. Lets hope Google corrects its path, as Id really like a working AI to chat with while I drive.BYD DJI Car Drone FeatureThe Chinese are doing some amazing things with their EVs. They have EVs that can become boats should you need to get out of a flood, EVs that can rotate on their axis, and flying cars that look like they are decent cars. They even have a car that jumps over obstacles on the road. Audis new E-Tron GT Performance does this as well, and I have to admit I lust for that car.But what caught my eye, particularly as I think about how AI could be used in driving, was the BYD/DJI (DJI is the biggest Chinese drone company) and their effort to wed a drone with their SUV line.Part of why I find this fascinating and want one is that I was a fan of the old Green Hornet TV show in the 1960s, and Black Beauty, Green Hornets car, had something like this. Audi has something similar, which is an amazing prototype.BYD is bringing it to market, and while I like the Audi concept better, there is an advantage to having something you can actually sell.However, in the Audi video linked above, you can see how a drone, or in the case of the Audi, drones, could be used to guide the way on dark roads, look ahead to see what the nature of a massive traffic jam is, or, in the case of a space alien invasion, realize in time that you need to be driving in the opposite direction fast (I watch too many sci-fi movies).I can picture driving to a picturesque area and then launching the drone to get a unique picture, using it to capture all aspects of an accident, sending it ahead to an area that looks dicey to make sure you can make it through (like if there is a flash flood warning), or looking for help if you are broken down and cant get a cell signal.And of course, pulling into a cars and coffee event and then launching the drone from your roof. It would surely draw attention from the one or two overpriced supercars that always seem to get the most attention. Not that Im into that at allI just think this BYD/DJI effort would be really cool. I only wish we could buy BYD cars here in the U.S. so I could check it out. So, this drone option is my Product of the Week.0 Commentaires 0 Parts 195 Vue
-
WWW.TECHNEWSWORLD.COMHow Drones Are Shaping Security at the US Southern BorderAs drones become a pivotal tool in both security and illicit operations, the skies over the U.S. southern border have turned into a high-tech battleground. Law enforcement agencies and drug cartels alike are leveraging drone technology for surveillance, smuggling, and counter-surveillance, raising urgent concerns about national security.With the rise of untraceable dark drones that evade traditional detection methods, the need for advanced drone monitoring systems has never been more critical. At the forefront of this effort is Mike Fraietta, co-founder and CEO of Gargoyle Systems, who is pioneering a decentralized drone detection network to counter emerging threats and enhance public awareness of aerial activity.According to Fraietta, traditional aerial craft detection methods face challenges from dark drones untraceable Unmanned Aerial Vehicles (UAVs) that use channel hopping or fiber optic technology to avoid RF detection.To counteract this, Gargoyle Systems focuses on acoustic detection, particularly for fiber-optic tethered drones emitting no RF signals. These drones pose a significant challenge to authorities, as they can operate over long distances without detection.His vision for the future of drone detection and its beneficial uses is clear. A comprehensive drone detection network must protect American citizens and infrastructure while enabling the ethical use of drones for valuable applications.The challenge isnt just detecting drones. Its ensuring they are used responsibly, Fraietta told TechNewsWorld.New Drone Detection Strategies EmergeFraietta launched Gargoyle Systems last year. Among its other projects, the company is developing tools to overcome limitations caused by drone intrusions. It will soon launch a product that creates a personal decentralized geo-fence or border wall that collects data on drones traversing an area.Fraietta, a physicist and certified FAA drone pilot, continually trains in drone security. He wants to monitor the changes being made to secure the southern border under new laws.We have advisors in the FAA and Department of Defense and Homeland Security. So, were keeping tabs on whats going on but are not officially involved in any way with the new folks down there or previously, he explained.How Drones Are Changing Border SecurityWhile drones present security challenges, they offer groundbreaking potential for emergency services and search-and-rescue operations. Fraietta is excited about the development of friendly drones designed to deliver medical aid, transport essential supplies, and assist in disaster relief efforts.Mike Fraietta, CEO of Gargoyle SystemsSince January, U.S. border agents have adjusted the role that drones can play in keeping borders secure. According to Fraietta, increased collaboration now occurs between DHS, local law enforcement, and the FAA. He likens these efforts to the creation of the TSA after 9/11,A drone czar may be needed to coordinate national drone security initiatives along with recent successes in border security, he mused.Despite efforts to enhance drone detection, Fraietta warns that dark drones operating outside radio frequencies are the biggest concern. As a result, law enforcement agencies are increasingly turning to AI and acoustic detection to identify illicit drone activity.He explained that using acoustic detection methods relies on perfecting the ability to identify the unique sounds of the propeller pitches, among other factors.Public Misconceptions and Drone Security RisksThe publics perception of drone flights led to hysteria in some instances. The governments veil of secrecy sometimes fuels fires of concern.For example, recent reports of drones flying over houses at night along the East Coast, particularly in multiple New Jersey counties and neighboring areas, stirred public concern. Some news accounts conveyed similar unexplained drone flights amid fears of surveillance or potential attacks.Public awareness regarding drone threats is essential. We need to think about how vulnerable our power grids, water supplies, and infrastructure are to drone attacks, Fraietta warned. Drones ability to deliver dangerous payloads to critical infrastructure remains a major security concern. Some local officials openly discussed shooting down drones. Meanwhile, some federal officials within the previous administration were emphatic that people were not seeing drones but small piloted aircraft.Amid increasing demands for transparency regarding the East Coast sightings, federal officials finally stated that the FAA authorized drone flights as part of an undisclosed test. Fraietta declined to comment, only suggesting that many of those drone sightings were unsubstantiated.A similar situation occurred in Colorado in 2019, where mass reports of drones resulted in no government disclosure of verifiable sightings, he said.Cartels, Border Agents Battle for Aerial ControlFraietta observed that AI-powered drones the cartels use are nearly as advanced as those operated by border patrol agents. Cartel drones transport narcotics, use night vision equipment, and leverage 3D printing modifications to evade detection.Cartel drone flights over the U.S. southern border could provoke an armed U.S. response. The Mexican cartels are leveraging drone technology for more than just drug smuggling, warned Fraietta without elaboration.U.S. border agents and Mexican drug cartels use them to spy on each other. One side searches for fentanyl labs, and the other tries to locate law enforcement. While the potential for cartel-operated drones carrying explosives exists, the risk of escalation makes it unlikely, he cautioned. If they start attacking border patrols, its a wrap. Cartels prefer to operate stealthily rather than provoke a heavy response from law enforcement.Despite efforts to enhance detection, Fraietta warns of dark drones persistent challenges. Drones operating off radio frequencies are our biggest concern, he said. Law enforcement agencies increasingly use AI and acoustic detection to identify illicit drone activity.Ethical Debate Over Drone TechnologyDrone technology raises ethical concerns, particularly around privacy and regulation. Fraietta advocates for greater investment in detection systems and a national drone security strategy.People should know whats flying over them, just like they know whos on their property, he insisted.Comparing drones to cars and firearms, he stressed the need for structured registration, licensing, and designated flight corridors to reduce noise and enhance safety. While the FAAs Remote ID tracking is a step forward, untraceable dark drones remain a serious challenge.Fraietta believes drone security isnt just about threat detection its about ensuring responsible use. As drones continue to shape security and commerce, robust regulations and advanced detection technology will be essential. Gargoyle Systems envisions a future where decentralized networks give citizens and authorities greater visibility and control over the skies.Law enforcement is working to counter cartel-operated drones, but the public must also stay informed about both the risks and benefits of drone use, he concluded.0 Commentaires 0 Parts 161 Vue
-
WWW.TECHNEWSWORLD.COMRemembering an Unassuming Tech Trailblazer: Tom MitchellIve been fortunate to have a few mentors who influenced the shape of my career at its formative stages. One of those people was Tom Mitchell, who unexpectedly passed away last November at the age of 76.I met Tom in February 1993 on a surprisingly pleasant weather day in Houston when I was interviewing for a product manager role at Compaq Computer Corporation. In those days, product manager candidates were put through an excruciating round of endurance-like interviews (I recall the number being nine or 10) in a single day, with your outcome being determined at the end of the day.Tom was the last examiner during my day-long interview gauntlet. I could tell he was exhausted from other business earlier in the day. But it was a good type of busy as Compaq was in the throes of its second growth ascendancy after announcing its low-cost ProLinea desktop PC lineup in 1992 to take on low-cost PC clones.Despite his fatigue, I was immediately impressed by Toms inquisitive questions about my professional background, knowledge of the PC space, and perhaps most importantly, my interest in making inroads into the consumer PC space, which Compaq had big plans for. Always a what you see is what you get type of guy, we immediately clicked, and it became the start of a remarkable 31-year friendship.Toms Program Management ExpertiseAlthough his career reached senior executive levels at Compaq, and at the latter part of his career, Foxconn/Hon Hai (a key component and eventual PC manufacturer for Compaq), Tom was, first and foremost, the prototypical program manager. He was the best of the best in that department.Few people outside the tech space understand precisely what a program manager does.An excellent program manager at a tech products company seamlessly integrates cross-functional teams, ensuring projects are delivered on time, within scope and cost budget, and aligned with strategic goals. They excel at balancing technical understanding with business acumen, translating complex requirements into actionable plans.By proactively identifying risks and dependencies, they mitigate potential roadblocks before they escalate. Their strong communication skills foster collaboration across diverse stakeholders, from engineers to executives, ensuring transparency and alignment.Ultimately, they are invaluable because they drive efficiency, clarity, and cohesion, enabling innovation to flourish in fast-paced, dynamic environments and deliver business results.Driving Success at CompaqThese attributes became incredibly critical as Compaqs consumer division grew to multi-billion revenue levels after its first consumer PCs branded Presario were announced in August 1993.From a persona standpoint, those who knew Tom well would describe him as Compaqs own Walter Cronkite non-emotional, data-driven, always doing the right thing, and succinct in his messaging and communications. If Tom told you that aliens had landed on the roof of CCA 5 (one of Compaqs early buildings in Spring, Texas), youd believe him.But Tom was far more than just a great program manager. He was a great leader and manager of people, many of whom would view Tom as a role model or mentor in the latter parts of their careers. Even some great people managers often struggle with establishing personal friendships with their employees due to the risk of crossing the line between the workplace and peoples personal lives. Not Tom. Tom managed the Consumer Division in a co-GM format with fellow Compaq colleague Tony Dowzall and had no problem encouraging (if not participating) in company events that humanized him.In the late 1990s, we announced one of the first consumer desktop PCs with 1394 connectivity (Apple would call it Firewire). This new technology enabled high-speed transfers of large video files between digital video cameras and PCs, a breakthrough that led to PCs and Macs becoming video editing devices something we take for granted in 2025.Tom and Tony agreed to play Dr. Evil and Austin Powers in an inter-company video, showing his lightheartedness and willingness to poke fun at himself. I wish I still had that video footage.Tom knew how to take calculated risks, too.While it seems quaint now, Compaq had an opportunity to work with AMD on announcing a technology demo of the worlds first 1Ghz desktop mini-tower using a liquid-based cooling solution that allowed us to demonstrate Compaqs innovative ethos. While this was simply a demo shown off at CES, it required scarce engineering resources that Tom ensured were available to make this industry-first demo a reality.A Life Built on Family and ValuesBorn in Scotland but spending his formative years growing up in Canada, Tom Mitchell was the consummate family man a devoted father whose greatest joy came from his time with his loving wife, Becky, to whom he was married for 53 wonderful years.Tom and Becky moved so many times during their marriage that she dubbed him a Scottish Gypsy. Still, together, they built a life filled with warmth, laughter, and unwavering support.Tom was a proud father to two daughters, Jackie and Carie. He cherished every moment of their lives and always encouraged them with his wisdom and kindness. His deep love for his family is evident in everything he did, serving as a constant source of strength and inspiration to those closest to him.The Mitchell family (L-R) Carie, Tom, Becky, and JackieOne thing about Tom that always stood out was his humility. He absolutely disdained attention. In a world where sports professionals, business leaders, politicians (and even industry analysts!) crave attention for their accomplishments, Tom let his accomplishments speak for themselves and was happy just playing golf with friends to let off some steam.A Legacy in Technology and BeyondTom joined Compaq during a pivotal era, contributing his vast expertise and visionary thinking to a company reshaping the world of personal computing.His managerial style and unassuming approach were perfect for Compaq as its consumer business grew rapidly. The company had its share of internal critics who were not crazy that it was succeeding in a low-cost business but consuming resources from other divisions. But he navigated through corporate politics with aplomb and grace.A true technologist at heart, Tom possessed an innate curiosity that fueled his passion for innovation. He departed Compaq after its acquisition by HP to join Taiwan-based Foxconn/Hon Hai, where he worked at a senior level to identify new tech categories and solutions for multiple OEMs.Toms ability to foresee trends and adapt to the rapid changes in the IT landscape was unparalleled. He played a critical role in projects that advanced Compaqs position as a leader in the industry, always approaching challenges with a blend of technical acumen and creative problem-solving. Beyond his professional achievements, Tom was revered for his unwavering integrity, generosity, and genuine kindness. He had a unique talent for making complex concepts accessible and fostering an environment of continuous learning and collaboration.His mentorship extended beyond technical guidance; he taught us the importance of resilience, humility, and staying true to ones values amidst competitive industry pressures.Compaq colleagues fondly remember Toms infectious (if dry) sense of humor during team meetings, thoughtful insights during strategic discussions, and an ever-present willingness to lend an ear or offer sage advice. His leadership style was characterized by empathy and respect, empowering those around him to excel and grow professionally and personally.Toms legacy is not confined to the projects he led or the innovations he championed; it lives on in the countless individuals he influenced. His impact resonates in the culture of excellence he helped cultivate, the careers he shaped, and the enduring friendships he formed.In honoring Toms memory, I know people will celebrate his values: a relentless pursuit of knowledge, a commitment to excellence, impeccable family values, and a deep respect and care for those around him.Remembering Toms Humor and WisdomI alluded earlier to Toms dry sense of humor. A prime example: when I completed my final interview at Compaq on that fateful day in Houston in 1993, Tom could tell that I was exhausted and gave me a few words of support. As I was walking out the door of his office, I asked him why so many people complained about the weather in Houston. With a twinkle in his eye, he told me, Mark, youll love it here. The weather in Houston is like this year-round.Tom, you will be missed by many!0 Commentaires 0 Parts 168 Vue
-
WWW.TECHNEWSWORLD.COMNew HMD X1 Safe Phone: Security for Parents, Cool Factor for KidsNew HMD X1 Safe Phone: Security for Parents, Cool Factor for KidsBy John P. Mello Jr.March 5, 2025 5:00 AM PTThe HMD X1 smartphone includes built-in parental controls and works with Xploras parental management app. ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! One knock against smartphones with built-in parental controls is that while they may give mom and dad a measure of comfort, theyre just too uncool for kids. Human Mobile Devices (HMD), a Finland-based phone maker, believes it can address that problem with its new HMD X1 phone announced on Sunday.At HMD, we believe kids shouldnt have to choose between safety and having a smartphone they love, Global Chief Marketing Officer Lars Silberbauer said in a statement.Parents have been asking for a solution that balances protection with freedom, and the HMD X1 delivers just that, he continued. Weve worked closely with families on our Better Phone Project to gain insight into how we can create a device that looks and feels like a premium smartphone while offering the safety guardrails parents need.This is a big step in redefining what a first phone should be one that gives kids a safe start in the digital world without feeling left out, he added.HMD launched The Better Phone Project in July 2024 to tackle the impact of smartphone use on the well-being of children and young people worldwide.In its first global survey of 10,000 parents, HMD found that 75% fear smartphones expose their children to internet dangers, while 65% worry about the impact of phone use on their childs mental health. In addition, more than half of parents surveyed regret giving their child a smartphone too soon.Parental Controls in a Phone That SlaysThe new HMD X1 gives parents complete control over their childs smartphone experience. It features a customizable app and internet access, allowing parents to limit social media, browsing, and screen time. It also includes location tracking with safe zones, emergency SOS calling, low battery alerts, and remote device access for parents.Whats more, theres a School Mode function that locks specific apps and features to minimize distractions during school hours. All settings can be managed remotely through an app by Xplora Technologies on a parents device, enabling them to adjust controls in real time based on their childs needs and environment. Oslo, Norway-based Xplora specializes in smartwatches and wearable devices for children.Xploras parental control app allows parents to manage the HMD X1 remotely, including location tracking, messaging, and device settings.As for the hardware, the X1 has a 108MP AI-powered camera, a 5000mAh battery, facial and fingerprint recognition unlock technology, and IP54-rated splash resistance. It also includes a 3.5mm headphone jack, which seems to be making a comeback with the younger set.The phone has a modular design, which can be customized with add-on Outfits. For example, the Gaming Outfit turns the X1 into a gaming console, the Flashy Outfit adds a built-in ring light for selfies, and the Power Outfit provides extra battery life for extended use.HMD X1s modular design allows users to customize their phone with interchangeable Outfits, including a gaming controller and a back-facing ring light for enhanced photography and video recording.Its a solution that checks all the boxes, but in real life, you have to look at what kids want to have, observed John Strand of Strand Consulting, a consulting firm with a focus on telecom, in Denmark. They dont want to go around with a phone thats not cool. They want an iPhone or an Android phone.Its like when I say I want to go to a nice burger bar and get a really good burger, but my kids say they want to go to McDonalds, he told TechNewsWorld. I think the day you can convince your kids to use a phone like this is probably the day you can convince them not to go to McDonalds.Content Monitoring Matters in Kids PhonesKids arent just little adults, and their brains dont work the same way, explained Titania Jordan, chief parent officer at Bark Technologies, a parental control and monitoring solutions company in Atlanta, and author of Parental Control: A Guide to Raising Balanced Kids in the Digital Era.Exposure to social media, violent content, bullying, online predators, and other serious things can drastically affect a childs well-being, she told TechNewsWorld. Because of this, parents need to be super involved in their childs digital world. Unfortunately, phones built for adults your regular iPhones and Androids dont have robust parental controls that actually work. Phones built for kids, on the other hand, should have specific tools to help protect children and put parents in the drivers seat from approving every new contact to managing screen time and blocking inappropriate websites to content analysis, she said.While the HMD X1 is better for a child than an iPhone, it doesnt contain content monitoring to alert parents to the very real dangers that children encounter online, Jordan noted. Unless a parent is going through every text, DM, comment, Google search, and countless other digital activities and thats highly unlikely they are going to miss potential issues and dangers their child encounters, she maintained.Many parents also dont know how to decipher teen slang terms or truly understand the different types of apps they may be allowing for their kids, she continued. One of the largest dangers facing children is the predatory and manipulative nature of chats in games, and content monitoring alerts parents to inappropriate conversations that could lead to grooming.Content monitoring is the defining feature of a thoughtful and safer kids phone because it gives families a digital safety net thats essential in the digital age, she added.Praise for HMD X1 On-Device ControlAlex Ambrose, a policy analyst with the Information Technology and Innovation Foundation, a research and public policy organization in Washington, D.C., cautioned that as the HMD X1 rolls out, it is crucial to consider the privacy implications of some of its features, like parental tracking and remote access.While these tools offer parents valuable oversight, regulations must ensure that privacy protections are built in from the start, she told TechNewsWorld.A childs understanding of privacy evolves as they get older, making it essential that safeguards grow alongside them and do not overburden them as they mature and are able to handle less parental oversight, she continued. Ensuring users are aware of these implications will be key to fostering responsible and informed use of the device. Ambrose praised the use of on-device controls by HMD. Device-level parental controls make it easier for parents and children alike to have a more seamless experience, making sure both apps and websites accessed on a device are child-appropriate a feature app store level verification lacks.Jennifer Huddleston, a technology policy research fellow at the Cato Institute, a Washington, D.C. think tank, contends that the market has generally responded to parents concerns over their kids use of smartphones.We have seen the market respond with various companies offering kid-safe devices that feature significant parental controls, as well as various levels of the tech ecosystem from ISPs and app stores to social media platforms offering a range of solutions to fit parents needs, she told TechNewsWorld.This shows that the market continues to respond to demands for more options for parents and young people, but also that such choices are not a one-size-fits-all approach, she said. In this way, having a variety of options for parents to find what best fits their needs for each child is preferable to many of the restrictive policy approaches that would also impact the speech and privacy rights of users of all ages.The images featured in this article are credited to HMD.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Smartphones0 Commentaires 0 Parts 186 Vue
-
WWW.TECHNEWSWORLD.COMOpera Adds Agentic AI to Its BrowserOpera Adds Agentic AI to Its BrowserBy John P. Mello Jr.March 4, 2025 5:00 AM PTImage Credit: Opera ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! Agentic AI getting AI to perform tasks rather than just create content from prompts is coming to the Opera browser.On Monday, the Norwegian company announced that its agent, Browser Operator, works inside Opera and will perform tasks on the web for users.Having an AI agent in the browser brings the advantage of letting you outsource the most monotonous tasks to the browser while you focus on the things that really matter to you, Opera Senior Vice President Jan Standal told TechNewsWorld.In a blog posting on its website, Opera explained that Browser Operator understands written instructions in natural language using the browser clients local resources. Operas AI Composer Engine processes that information to complete tasks in the browser.Browser Operator will pause and ask a user to take action whenever it needs them to fill in a form, confirm an order, or perform some other sensitive task. In this entire process, the user is in control and can take over at any moment from Browser Operator. They can also review all the steps the agent took to perform a requested task.Many of the tasks that people perform in their internet browsers are repetitive, like scouring online retailers for the best prices or checking the same feeds for notable activity, explained Max Vermier, senior director of AI strategy at Abbyy, a global intelligent automation company.Instead of spending countless minutes or even hours of your own time on these monotonous searches for information, an AI agent can autonomously gather it and present you with its findings in a fraction of the time, he told TechNewsWorld. AI agents can be your personal productivity assistant, taking on your busy work and allowing you to make consequential decisions.Its like having a personal assistant who automatically helps with all tasks online from planning and booking a vacation to keeping track of property tax deadlines, added Ambuj Kumar, founder of Simbian, a provider of autonomous AI agents for cybersecurity in Mountain View, Calif.Not only is the idea very powerful and completely feasible today, he told TechNewsWorld, but this could be one of those technologies that helps everyone.First Native AI AgentAlthough other browsers have incorporated AI features, Opera is the first to make an AI agent native to a browser. The concept is not new, but the way that Opera is implementing it is new, said Sandi Besen, an applied AI researcher at IBM and Neudesic, a global professional services company.Other companies capture screenshots and screen videos and send them to their AI models in the cloud to follow through on actions. Browser Operator interacts with the elements on a web page through Document Object Model technology.Basically, the DOM is automatically created by the browser, Besen told TechNewsWorld. Its essentially an in-memory representation of the web pages structure.One advantage of using DOM, she noted, is it creates a more seamless user experience because its more native to the browser environment.It improves the agents performance, too. It doesnt need to take a screenshot, send that to the model, wait for what the model wants to do next, and then execute a tool to make something happen in the browser, she explained. Instead, it can just access the web page data.It also enhances privacy because everything is done locally on the device, she continued. Its not being run or sent to a server or a cloud-based hosted model somewhere. So the informations being kept locally, which is better for privacy concerns, especially if youre navigating things like login information or passwords.Komninos Chatzipapas, founder of HeraHaven AI, developer of an AI-based virtual companion app, in St. Petersburg, Fla. added that a significant advantage of doing agentic AI natively and locally on the browser is, unlike the cloud approach of OpenAIs Operator, users will already be logged into all their accounts. You will be using your local IP, so you wont need to solve captchas every other minute like on Operator, he told TechNewsWorld.Can Operas AI Shift Market Share?Operas innovative approach could give it some leverage in a market where it has been only a niche player. This is one potential advantage for Opera, said Rob Enderle, president and principal analyst of the Enderle Group, an advisory services firm in Bend, Ore.Others treat browsers as cost centers and thus dont put much development emphasis on them, he told TechNewsWorld. Opera, by focusing advancement on their browser, could move around the more established players if users find this feature compelling, and they may.He argued that Browser Operator could have an impact on Operas market share. It depends on how well Opera can get the word out, get influencers to use the feature, and then get to a critical mass of regular users to drive an adoption wave, he said. In theory, Operas Browser Operator AI could enhance its market position by differentiating it from competitors, noted Mark N. Vena, president and principal analyst with SmartTech Research in Las Vegas.By integrating agentic AI for automation, search efficiency, and task execution, Opera may attract tech-savvy users, he told TechNewsWorld. However, market impact depends on execution, adoption rates, and competition from big-hitter AI-enhanced browsers like Edge, Copilot, and Chrome, with Gemini.Ross Rubin, the principal analyst at Reticle Research, a consumer technology advisory firm in New York City, pointed out that AI innovation hasnt been successful in the past in disgorging market share from entrenched players.Microsofts launching of an AI-infused Bing brought more attention to that search engine than we had seen in a long time, but it hasnt meaningfully moved the needle for Bing in terms of search engine share, he told TechNewsWorld.And theres less of a barrier going to Bing instead of Google, as opposed to downloading a whole new browser, he said. So, Browser Operator is probably not going to do much in terms of Operas relative standing.AI Agents EverywhereBrowser Operator is just the first of what will be a proliferation of AI agents, predicted David Johnston, a contributor to Morpheus, an open-source platform for launching smart agents. All browsers will include them, as the productivity increases are amazing, he told TechNewsWorld.AI is in discovery mode, and people are experimenting with where to best access its powers, he said. From websites to dedicated apps, smart agents will be everywhere.Web browsers are there to make you more powerful while youre online, browsing the web and to give you the tools to use your time more effectively, Operas Standal added. Browser Operator showcases that we have the capability of making a useful and smart tool within the browser which aligns with the overall objective of a web browser of being useful.With this feature preview were showing a proof of concept of where AI could take us when we use AI to leverage our work building a web browser and this applies to every industry, he said.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Artificial Intelligence0 Commentaires 0 Parts 169 Vue
-
WWW.TECHNEWSWORLD.COMAmazon Moves To Make Alexa SmartWhen we started with digital assistants, Microsoft potentially had the inside track. Its Cortana effort was named after the Halo AI character, which gave it far more potential than the others.Apple had a decent shot, too. It marketed Siri very well but didnt seem to want to fund its advancement, while Amazon just shipped product after product that used Alexa.Google was no slouch either, pivoting hard to its Gemini product (which I use a lot) for Pixel smartphones.What I find fascinating is that Panos Panay, the guy who pretty much made the Microsoft Surface line a thing and drove my favorite phone, the Surface Duo, is now at Amazon and apparently doing there what should have happened at Microsoft with Cortana.Lets discuss how we got here, what to expect, and why this move from Amazon will be a game-changer. Well close with my Product of the Week: AMDs new RX 9070 and RX 9070 XT graphics cards.Microsofts Cortana FailureMicrosoft was one of the first to introduce a believable AI assistant. What made it believable was that it was named after a character in the Halo video game. To make it work, Microsoft needed to advance this technology and make it look like it did in the game.You might have thought this was a stretch, but an engineer working on his own created exactly what this would have looked like, and it worked. Imagine how this would have set the stage and provided a huge competitive advantage for the company once generative AI was driving into the market years later. It would have been the centerpiece of any tech-forward home, particularly for those of us who got hooked on Halo back in the day.Then, instead of becoming the digital assistant that would rule them all, Microsoft did what it so often does these days: it underfunded and under-executed the effort with virtually no help from marketing and eventually pulled the plug on it years before generative AI became a thing.Apples Siri MisstepApple also had a shot at this race with Siri, which was, compared to Microsoft, far better marketed and executed even though, like Cortana, it really wasnt AI so much as a text-to-speech, speech-to-text interface for the web. Apple had more people using Siri than any of the alternatives, but the promise of Siri that the ads tended to convey was well short of Siris reality. Even today, when Im on a panel discussing AI, someone almost always points to Siri and argues that it isnt AI because it sets such a bad example.Apple had the opportunity as part of its now failed partnership with IBM (who saw that coming?) to have Siri be the front-end for IBMs watsonx, which would have made Siri into the first digital assistant that was a true AI. But that partnership was virtually dead on arrival, largely because Apple just doesnt work well with partners. While IBM has a far better partnership skill set, even IBM couldnt save the thing.Siri remains in use though that may change now that Apple can spell AI but its still the disappointment it has always been.Alexa SurpriseAmazon has lost billions on Alexa. However, arguing that Alexa is a failure is unfounded mainly because many users order products from Amazon using Alexa. Unlike the others, Amazon saw the potential to create a front end for the retail business and use the digital assistant to remind and help people to order stuff and become a trusted part of their day.I know we often start our day asking Alexa about the weather and end the day asking Alexa about actors in shows (for those not using Amazon X-Ray, which is a truly handy feature available with Amazon streaming content) or getting color on the limited information were watching on TV.Even though, just like Cortana was, and Siri is, Alexa is more of a web front end than true AI and has proven far more useful. The only thing we use almost as much is Googles digital assistant, which, for some reason, doesnt have a cute name.What will change in the coming weeks is that Alexa moves to generative AI. Granted, that move was promised in 2023, but this turned out to be more difficult than they thought. Still, it is better to do something well than quickly and while this feature will only be for Prime members, so it is not truly free, the result should be a huge improvement in this technology class.The generative AI assistant will be called Alexa+. It will work on most Alexa devices, a smartphone app, and the Amazon website. So, although Amazon wasnt first, didnt have a game to connect to, and was more of a retailer than a tech company, it out-executed Apple, Google, and Microsoft.Google is arguably a distant second with its planned implementation in Pixel phones, which may be a problem for me because I carry a Pixel phone, and I might prefer Alexa+.Wrapping Up: Alexa+If you arent working with AI, you should start because youll need that skill set to do many things in the second half of this decade. AI can handle complex questions with detailed answers, generate content, offer nuanced advice, and even assist with productivity.Alexa+ will let up jump to scenes in movies you own or rent on Amazons video service, ask for unique playlists on Amazon Music, and get far better answers than just a reading of a web page that Alexa would have previously defaulted to. Youll be able to use natural language rather than the Alexa commands you need to learn, and youll be able to give it complex, multi-step directions based on historical knowledge. For example, you can ask it to book the same place for your anniversary that you booked last year, purchase tickets at specified prices, or even recommend and contact repair services for something broken.With the Rink security cameras and this is huge you could ask Alexa+ to show you any images of people who have been frequenting your property, how often your kids are actually walking the dog, or to figure out where your cat is (assuming a camera has or can see it).There will likely be some quality problems because AI developers arent focusing enough on quality yet, which I think is a huge mistake. So youll want to be careful about taking everything Alexa+ says as fact. There will likely be some issues with third-party applications until they become fully integrated, but this is huge, and I think it will change how we look at digital assistants going forward.Panos Panay wasnt able to execute at Microsoft, though I know he tried so its great to see Amazon give him what he needed to perform there. Maybe a future Amazon device will be able to do what that Cortana prototype did and give Alexa+ a face. Well see.AMD Radeon RX 9000 Series Graphics CardsAMD has put a lot of effort into creating a set of graphics cards that should be a huge value when they appear on the market on March 6. The RX 9070 and RX 9070 XT, priced at $549 and $599, will be available through partners such as Acer, Asus, ASRock, Gigabyte, PowerColor, Sapphire, XFX, and Yeston.I have both of these cards in the RX 9070 and RX 9070 XT and while I cant yet talk about what Im seeing, I will say Im impressed with them.This is the first AI graphics card set from AMD to really push generative AI performance. It promises AI performance improvements over prior generations of between 12% and a whopping 70%, depending on the model, which makes a massive difference if you are waiting for the result of some AI analysis.Gaming isnt slacking either, with support for up to 80 FPS at 8K resolutions using accelerated post-processing effects.XFX Radeon RX 9000 Series GPU A powerful gaming GPU with an aggressive design, triple-fan cooling, and customizable RGB lighting.My primary PC is an AMD desktop machine I built a year ago. While these cards will work fine with Intel processors, there is increased synergy with AMD processors, making them even better for those of us running AMD desktops.ASRock Taichi Radeon RX 9000 Series GPU A high-performance graphics card with a striking industrial design and RGB lighting.AMD, Intel, and Nvidia do impressive upscaling to get higher frame rates at extreme resolutions. AMDs acceleration on these cards is around 3x base levels, which is pretty remarkable.At launch, over 30 of the top games will be supported with these cards (meaning they can use most of these cards unique capabilities). Before the end of the year, this number is expected to jump to over 75 current titles.Sapphire Radeon RX 9000 Series GPU A sleek, triple-fan cooling solution designed for efficient thermal performance and quiet operation.These AI-optimized GPUs enhance visuals, boost performance, and push generative AI capabilities forward, making the Radeon RX 9070 and RX 9070 XT my Product of the Week.The Radeon RX 9000 Series images featured in this article are courtesy of AMD.0 Commentaires 0 Parts 209 Vue
-
WWW.TECHNEWSWORLD.COMWhy Texas Is the Ideal Home for Apples AI Data CenterApple on Monday announced a $500 billion investment in the United States over the next four years, a commitment that includes the development of a state-of-the-art data center in Houston.This facility will be crucial in producing servers for Apple Intelligence, the companys AI-driven system, to enhance user productivity and creativity.Apples decision to establish such a critical infrastructure in Texas underscores the states growing technological prominence and highlights the factors that make it a prime destination for significant tech investments.Texas Business Climate Attracts Tech GiantsThanks to its business-friendly environment, economic incentives, and robust infrastructure, Texas has long been a magnet for technology companies.One of the states most significant advantages is its favorable tax policies. Texas offers various incentives for businesses, including exemptions on sales and use taxes for equipment and electricity used in data centers. This attribute significantly lowers operational costs, making it an attractive location for companies looking to expand their footprint.Texas has a long history of tech investment dating back to the mid-1980s when Compaq Computer Corporation was founded. Compaq built the majority of its PCs and servers in Houston in elaborate manufacturing facilities before outsourcing production to Taiwan, courtesy of the lower costs offered by the likes of Foxconn, Quanta, and other ODMs (original design manufacturers).The Lone Star state also has no personal income tax, which can be a draw for highly skilled workers looking to relocate.Texas Energy Edge Powers AI Data CentersThis is crucial: another key reason for Apples choice is Texas energy infrastructure. Data centers require vast amounts of electricity to power and cool servers. Texas boasts some of the most affordable energy rates in the country, with industrial rates as low as $0.06 per kilowatt-hour.This cost-effectiveness, combined with the states investments in renewable energy sources like wind and solar, ensures a reliable and sustainable power supply. The abundance of energy makes Texas an ideal location for high-performance computing and AI-driven operations that demand constant uptime. In addition to economic benefits, Texas offers a well-developed infrastructure that supports high-speed connectivity and efficient logistics. Major cities like Dallas and Houston are home to extensive fiber-optic networks, ensuring optimal performance for data centers. Houston, in particular, has developed into a growing tech hub with a concentration of enterprise IT services and data management firms.The states central location also makes it a strategic distribution point for national and global technology operations, reducing latency for cloud computing services.Texas Talent Fuels Tech ExpansionUnlike traditional manufacturing facilities, AI data centers require highly experienced workers. For that reason, Texas workforce is another significant factor in Apples decision. The state is home to top-tier universities, such as the University of Texas at Austin, which produces thousands of engineering and computer science graduates annually.This steady talent pipeline provides tech companies with the skilled professionals to drive innovation and maintain operations. The concentration of tech talent in Austin, often called Silicon Hills, has already attracted major players like Tesla, Dell, and Oracle, further strengthening the regions appeal.Apples investment will also bring substantial job creation, benefiting the local economy and the broader U.S. workforce. The Houston facility is expected to create thousands of jobs, spanning high-tech engineering, manufacturing, and facility operations.While data centers typically require large workforces during construction, the long-term employment opportunities they create such as IT management and cybersecurity roles contribute to developing a highly specialized workforce. This influx of employment and innovation will likely spur additional economic activity, benefiting local businesses and service providers.Apple Expansion Bolsters U.S. Tech IndependenceBeyond job creation, Apples investment aligns with broader national objectives to strengthen domestic manufacturing and technology independence. By onshoring the production of AI servers, Apple reduces its reliance on overseas supply chains and mitigates risks associated with global disruptions.This move also responds to recent policy shifts, including tariffs on imported goods, which have incentivized companies to reevaluate their manufacturing and logistics strategies. Apples decision to invest heavily in Texas reflects the states growing reputation as a premier destination for tech giants. With its combination of low energy costs, business incentives, skilled workforce, and robust infrastructure, Texas offers an ideal environment for data centers and AI-driven operations.As Apple embarks on this ambitious expansion, it reinforces its commitment to U.S. manufacturing and helps solidify Texas position as a leader in the tech industry. This investment is expected to drive further innovation and economic growth, cementing Texas status as a top choice for high-tech enterprises looking to scale their operations in the years ahead.Reality Check on Apples $500B InvestmentApples announcement of a $500 billion investment in the U.S., including data centers in Texas, may seem like a massive new commitment. However, it represents a cumulative figure that spans multiple years.Apple has consistently invested billions annually in U.S. infrastructure, manufacturing, and data centers. For example, in 2018, the company pledged to invest $350 billion over five years, and in 2021, it announced an additional $430 billion investment plan.The latest $500 billion figure likely includes previous commitments, ongoing expansions, and routine capital expenditures. While Apples continued investment in Texas is significant, the headline number can be misleading, as it doesnt necessarily indicate a sudden increase in spending. Instead, it reflects Apples long-term growth strategy and ongoing infrastructure projects.Nevertheless, while the focus on Texas aligns with Apples broader efforts to expand its data center footprint, the new investment scale is somewhat less dramatic than it appears.0 Commentaires 0 Parts 212 Vue
Plus de lecture