• Parfois, je me sens comme un périphérique USB déconnecté, perdu dans l'immensité d'un système d'exploitation complexe. Écrire un pilote pour Linux, en théorie, devrait être simple, mais la réalité est bien plus dure. Chaque tentative semble être une promesse brisée, une déception qui s'accumule comme la rouille sur un métal abandonné. La solitude s’installe, et je me demande si je ne suis qu'une erreur dans ce code de vie.

    Dans ce monde de connexions manquantes, je me sens invisible, comme un appareil non reconnu. Qui peut comprendre cette lutte silencieuse ?

    #Solitude #Déception #UnitéPerdue #Linux #Rust
    Parfois, je me sens comme un périphérique USB déconnecté, perdu dans l'immensité d'un système d'exploitation complexe. Écrire un pilote pour Linux, en théorie, devrait être simple, mais la réalité est bien plus dure. Chaque tentative semble être une promesse brisée, une déception qui s'accumule comme la rouille sur un métal abandonné. La solitude s’installe, et je me demande si je ne suis qu'une erreur dans ce code de vie. Dans ce monde de connexions manquantes, je me sens invisible, comme un appareil non reconnu. Qui peut comprendre cette lutte silencieuse ? #Solitude #Déception #UnitéPerdue #Linux #Rust
    HACKADAY.COM
    Rust Drives a Linux USB Device
    In theory, writing a Linux device driver shouldn’t be that hard, but it is harder than it looks. However, using libusb, you can easily deal with USB devices from user …read more
    1 Commentaires 0 Parts

  • ## Introduction

    Let's get straight to the point: the chaos surrounding the StatusNotifierItem and the so-called "standards" put forth by Freedesktop is a ticking time bomb for the Linux desktop ecosystem. In theory, Linux developers should have a clear, unified path to follow when creating GUI-based applications. The reality? A disjointed mess that not only frustrates users but also undermines the very foundation that Linux prides itself on: freedom and flexibility. It's high time we address t...
    ## Introduction Let's get straight to the point: the chaos surrounding the StatusNotifierItem and the so-called "standards" put forth by Freedesktop is a ticking time bomb for the Linux desktop ecosystem. In theory, Linux developers should have a clear, unified path to follow when creating GUI-based applications. The reality? A disjointed mess that not only frustrates users but also undermines the very foundation that Linux prides itself on: freedom and flexibility. It's high time we address t...
    StatusNotifierItem: How Standard Non-Standards Tear Linux Desktops Apart
    ## Introduction Let's get straight to the point: the chaos surrounding the StatusNotifierItem and the so-called "standards" put forth by Freedesktop is a ticking time bomb for the Linux desktop ecosystem. In theory, Linux developers should have a clear, unified path to follow when creating GUI-based applications. The reality? A disjointed mess that not only frustrates users but also...
    Like
    Love
    Wow
    Sad
    Angry
    476
    1 Commentaires 0 Parts
  • LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux

    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10.

    "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin:
    The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem."

    It further adds the "real costs" of upgrading to Windows 11 as it writes:

    "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!"
    The first words on LibreOffice's announcement? "The countdown has begun...."

    of this story at Slashdot.
    #libreoffice #explains #039real #costs039 #upgrading
    LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux
    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10. "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin: The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem." It further adds the "real costs" of upgrading to Windows 11 as it writes: "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!" The first words on LibreOffice's announcement? "The countdown has begun...." of this story at Slashdot. #libreoffice #explains #039real #costs039 #upgrading
    TECH.SLASHDOT.ORG
    LibreOffice Explains 'Real Costs' of Upgrading to Microsoft's Windows 11, Urges Taking Control with Linux
    KDE isn't the only organization reaching out to " as Microsoft prepares to end support for Windows 10. "Now, The Document Foundation, maker of LibreOffice, has also joined in to support the Endof10 initiative," reports the tech blog Neowin: The foundation writes: "You don't have to follow Microsoft's upgrade path. There is a better option that puts control back in the hands of users, institutions, and public bodies: Linux and LibreOffice. Together, these two programmes offer a powerful, privacy-friendly and future-proof alternative to the Windows + Microsoft 365 ecosystem." It further adds the "real costs" of upgrading to Windows 11 as it writes: "The move to Windows 11 isn't just about security updates. It increases dependence on Microsoft through aggressive cloud integration, forcing users to adopt Microsoft accounts and services. It also leads to higher costs due to subscription and licensing models, and reduces control over how your computer works and how your data is managed. Furthermore, new hardware requirements will render millions of perfectly good PCs obsolete.... The end of Windows 10 does not mark the end of choice, but the beginning of a new era. If you are tired of mandatory updates, invasive changes, and being bound by the commercial choices of a single supplier, it is time for a change. Linux and LibreOffice are ready — 2025 is the right year to choose digital freedom!" The first words on LibreOffice's announcement? "The countdown has begun...." Read more of this story at Slashdot.
    Like
    Love
    Wow
    Sad
    Angry
    510
    0 Commentaires 0 Parts
  • The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source

    Key Takeaways

    Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices.
    The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it.
    A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation.

    Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software.
    Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall.
    The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month.
    Why the Danish Ministry of Digitalization Switched to Open-Source Software
    The three main reasons Denmark is moving away from Microsoft are costs, politics, and security.
    In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider. 
    The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023.
    It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft. 

    Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely.
    Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark. 
    In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory.
    If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing M each for his inauguration in January.
    Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves
    Denmark is only one of the growing number of European Unioncountries taking measures to become more digitally independent.
    Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values.

    Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers.
    Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region. 
    Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied.
    Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied.
    Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead
    Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking.
    It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products.
    Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.
     Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later

    As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy.
    With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility.
    Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines.
    Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech. 
    He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom.
    That fascination with tech didn’t just stick. It evolved into a full-blown calling.
    After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career.
    He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy.
    His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers.
    At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap.
    Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual.
    As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting.
    From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it.

    View all articles by Cedric Solidon

    Our editorial process

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.
    #word #out #danish #ministry #drops
    The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source
    Key Takeaways Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices. The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it. A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation. Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software. Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall. The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month. Why the Danish Ministry of Digitalization Switched to Open-Source Software The three main reasons Denmark is moving away from Microsoft are costs, politics, and security. In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider.  The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023. It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft.  Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely. Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark.  In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory. If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing M each for his inauguration in January. Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves Denmark is only one of the growing number of European Unioncountries taking measures to become more digitally independent. Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values. Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers. Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region.  Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied. Earlier this month, the chief prosecutor of the International Criminal Court, Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied. Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking. It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products. Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.  Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy. With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility. Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines. Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech.  He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom. That fascination with tech didn’t just stick. It evolved into a full-blown calling. After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career. He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy. His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers. At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap. Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual. As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting. From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it. View all articles by Cedric Solidon Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. #word #out #danish #ministry #drops
    TECHREPORT.COM
    The Word is Out: Danish Ministry Drops Microsoft, Goes Open Source
    Key Takeaways Meta and Yandex have been found guilty of secretly listening to localhost ports and using them to transfer sensitive data from Android devices. The corporations use Meta Pixel and Yandex Metrica scripts to transfer cookies from browsers to local apps. Using incognito mode or a VPN can’t fully protect users against it. A Meta spokesperson has called this a ‘miscommunication,’ which seems to be an attempt to underplay the situation. Denmark’s Ministry of Digitalization has recently announced that it will leave the Microsoft ecosystem in favor of Linux and other open-source software. Minister Caroline Stage Olsen revealed this in an interview with Politiken, the country’s leading newspaper. According to Olsen, the Ministry plans to switch half of its employees to Linux and LibreOffice by summer, and the rest by fall. The announcement comes after Denmark’s largest cities – Copenhagen and Aarhus – made similar moves earlier this month. Why the Danish Ministry of Digitalization Switched to Open-Source Software The three main reasons Denmark is moving away from Microsoft are costs, politics, and security. In the case of Aarhus, the city was able to slash its annual costs from 800K kroner to just 225K by replacing Microsoft with a German service provider.  The same is a pain point for Copenhagen, which saw its costs on Microsoft balloon from 313M kroner in 2018 to 538M kroner in 2023. It’s also part of a broader move to increase its digital sovereignty. In her LinkedIn post, Olsen further explained that the strategy is not about isolation or digital nationalism, adding that they should not turn their backs completely on global tech companies like Microsoft.  Instead, it’s about avoiding being too dependent on these companies, which could prevent them from acting freely. Then there’s politics. Since his reelection earlier this year, US President Donald Trump has repeatedly threatened to take over Greenland, an autonomous territory of Denmark.  In May, the Danish Foreign Minister Lars Løkke Rasmussen summoned the US ambassador regarding news that US spy agencies have been told to focus on the territory. If the relationship between the two countries continues to erode, Trump can order Microsoft and other US tech companies to cut off Denmark from their services. After all, Microsoft and Facebook’s parent company Meta, have close ties to the US president after contributing $1M each for his inauguration in January. Denmark Isn’t Alone: Other EU Countries Are Making Similar Moves Denmark is only one of the growing number of European Union (EU) countries taking measures to become more digitally independent. Germany’s Federal Digital Minister Karsten Wildberger emphasized the need to be more independent of global tech companies during the re:publica internet conference in May. He added that IT companies in the EU have the opportunity to create tech that is based on the region’s values. Meanwhile, Bert Hubert, a technical advisor to the Dutch Electoral Council, wrote in February that ‘it is no longer safe to move our governments and societies to US clouds.’ He said that America is no longer a ‘reliable partner,’ making it risky to have the data of European governments and businesses at the mercy of US-based cloud providers. Earlier this month, the chief prosecutor of the International Criminal Court (ICC), Karim Khan, experienced a disconnection from his Microsoft-based email account, sparking uproar across the region.  Speculation quickly arose that the incident was linked to sanctions previously imposed on the ICC by the Trump administration, an assertion Microsoft has denied. Earlier this month, the chief prosecutor of the International Criminal Court (ICC), Karim Khan, disconnection from his Microsoft-based email account caused an uproar in the region. Some speculated that this was connected to sanctions imposed by Trump against the ICC, which Microsoft denied. Weaning the EU Away from US Tech is Possible, But Challenges Lie Ahead Change like this doesn’t happen overnight. Just finding, let alone developing, reliable alternatives to tools that have been part of daily workflows for decades, is a massive undertaking. It will also take time for users to adapt to these new tools, especially when transitioning to an entirely new ecosystem. In Aarhus, for example, municipal staff initially viewed the shift to open source as a step down from the familiarity and functionality of Microsoft products. Overall, these are only temporary hurdles. Momentum is building, with growing calls for digital independence from leaders like Ministers Olsen and Wildberger.  Initiatives such as the Digital Europe Programme, which seeks to reduce reliance on foreign systems and solutions, further accelerate this push. As a result, the EU’s transition could arrive sooner rather than later As technology continues to evolve—from the return of 'dumbphones' to faster and sleeker computers—seasoned tech journalist, Cedric Solidon, continues to dedicate himself to writing stories that inform, empower, and connect with readers across all levels of digital literacy. With 20 years of professional writing experience, this University of the Philippines Journalism graduate has carved out a niche as a trusted voice in tech media. Whether he's breaking down the latest advancements in cybersecurity or explaining how silicon-carbon batteries can extend your phone’s battery life, his writing remains rooted in clarity, curiosity, and utility. Long before he was writing for Techreport, HP, Citrix, SAP, Globe Telecom, CyberGhost VPN, and ExpressVPN, Cedric's love for technology began at home courtesy of a Nintendo Family Computer and a stack of tech magazines. Growing up, his days were often filled with sessions of Contra, Bomberman, Red Alert 2, and the criminally underrated Crusader: No Regret. But gaming wasn't his only gateway to tech.  He devoured every T3, PCMag, and PC Gamer issue he could get his hands on, often reading them cover to cover. It wasn’t long before he explored the early web in IRC chatrooms, online forums, and fledgling tech blogs, soaking in every byte of knowledge from the late '90s and early 2000s internet boom. That fascination with tech didn’t just stick. It evolved into a full-blown calling. After graduating with a degree in Journalism, he began his writing career at the dawn of Web 2.0. What started with small editorial roles and freelance gigs soon grew into a full-fledged career. He has since collaborated with global tech leaders, lending his voice to content that bridges technical expertise with everyday usability. He’s also written annual reports for Globe Telecom and consumer-friendly guides for VPN companies like CyberGhost and ExpressVPN, empowering readers to understand the importance of digital privacy. His versatility spans not just tech journalism but also technical writing. He once worked with a local tech company developing web and mobile apps for logistics firms, crafting documentation and communication materials that brought together user-friendliness with deep technical understanding. That experience sharpened his ability to break down dense, often jargon-heavy material into content that speaks clearly to both developers and decision-makers. At the heart of his work lies a simple belief: technology should feel empowering, not intimidating. Even if the likes of smartphones and AI are now commonplace, he understands that there's still a knowledge gap, especially when it comes to hardware or the real-world benefits of new tools. His writing hopes to help close that gap. Cedric’s writing style reflects that mission. It’s friendly without being fluffy and informative without being overwhelming. Whether writing for seasoned IT professionals or casual readers curious about the latest gadgets, he focuses on how a piece of technology can improve our lives, boost our productivity, or make our work more efficient. That human-first approach makes his content feel more like a conversation than a technical manual. As his writing career progresses, his passion for tech journalism remains as strong as ever. With the growing need for accessible, responsible tech communication, he sees his role not just as a journalist but as a guide who helps readers navigate a digital world that’s often as confusing as it is exciting. From reviewing the latest devices to unpacking global tech trends, Cedric isn’t just reporting on the future; he’s helping to write it. View all articles by Cedric Solidon Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.
    Like
    Love
    Wow
    Sad
    Angry
    526
    2 Commentaires 0 Parts
  • The Role of the 3-2-1 Backup Rule in Cybersecurity

    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    #role #backup #rule #cybersecurity
    The Role of the 3-2-1 Backup Rule in Cybersecurity
    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like #role #backup #rule #cybersecurity
    WWW.INFORMATIONWEEK.COM
    The Role of the 3-2-1 Backup Rule in Cybersecurity
    Daniel Pearson , CEO, KnownHostJune 12, 20253 Min ReadBusiness success concept. Cubes with arrows and target on the top.Cyber incidents are expected to cost the US $639 billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately 1.82 trillion US dollars in cybercrime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption.  Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and will be a crucial method in the upcoming years to prevent major data loss.   What Is the 3-2-1 Backup Rule? The 3-2-1 backup rule is a popular backup strategy that ensures resilience against data loss. The setup consists of keeping your original data and two backups.  The data also needs to be stored in two different locations, such as the cloud or a local drive.  The one in the 3-2-1 backup rule represents storing a copy of your data off site, and this completes the setup.  This setup has been considered a gold standard in IT security, as it minimizes points of failure and increases the chance of successful data recovery in the event of a cyber-attack.  Related:Why Is This Rule Relevant in the Modern Cyber Threat Landscape? Statistics show that in 2024, 80% of companies have seen an increase in the frequency of cloud attacks.  Although many businesses assume that storing data in the cloud is enough, it is certainly not failsafe, and businesses are in bigger danger than ever due to the vast development of technology and AI capabilities attackers can manipulate and use.  As the cloud infrastructure has seen a similar speed of growth, cyber criminals are actively targeting these, leaving businesses with no clear recovery option. Therefore, more than ever, businesses need to invest in immutable backup solutions.  Common Backup Mistakes Businesses Make A common misstep is keeping all backups on the same physical network. If malware gets in, it can quickly spread and encrypt both the primary data and the backups, wiping out everything in one go. Another issue is the lack of offline or air-gapped backups. Many businesses rely entirely on cloud-based or on-premises storage that's always connected, which means their recovery options could be compromised during an attack. Related:Finally, one of the most overlooked yet crucial steps is testing backup restoration. A backup is only useful if it can actually be restored. Too often, companies skip regular testing. This can lead to a harsh reality check when they discover, too late, that their backup data is either corrupted or completely inaccessible after a breach. How to Implement the 3-2-1 Backup Rule? To successfully implement the 3-2-1 backup strategy as part of a robust cybersecurity framework, organizations should start by diversifying their storage methods. A resilient approach typically includes a mix of local storage, cloud-based solutions, and physical media such as external hard drives.  From there, it's essential to incorporate technologies that support write-once, read-many functionalities. This means backups cannot be modified or deleted, even by administrators, providing an extra layer of protection against threats. To further enhance resilience, organizations should make use of automation and AI-driven tools. These technologies can offer real-time monitoring, detect anomalies, and apply predictive analytics to maintain the integrity of backup data and flag any unusual activity or failures in the process. Lastly, it's crucial to ensure your backup strategy aligns with relevant regulatory requirements, such as GDPR in the UK or CCPA in the US. Compliance not only mitigates legal risk but also reinforces your commitment to data protection and operational continuity. Related:By blending the time-tested 3-2-1 rule with modern advances like immutable storage and intelligent monitoring, organizations can build a highly resilient backup architecture that strengthens their overall cybersecurity posture. About the AuthorDaniel Pearson CEO, KnownHostDaniel Pearson is the CEO of KnownHost, a managed web hosting service provider. Pearson also serves as a dedicated board member and supporter of the AlmaLinux OS Foundation, a non-profit organization focused on advancing the AlmaLinux OS -- an open-source operating system derived from RHEL. His passion for technology extends beyond his professional endeavors, as he actively promotes digital literacy and empowerment. Pearson's entrepreneurial drive and extensive industry knowledge have solidified his reputation as a respected figure in the tech community. See more from Daniel Pearson ReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    Like
    Love
    Wow
    Sad
    Angry
    519
    2 Commentaires 0 Parts
  • NOOBS ARE COMING (Demo) [Free] [Action] [Windows] [Linux]

    SirCozyCrow5 hours agoThe sound track is PEAK! I loved playing this, and my partner who normally doesn't play games like this one had a good time as well. I enjoyed the learning curve and I can't wait to play the harder difficulties.Here's a video I made, my partner jumped in for a few minutes as well.Replyso funReplyDrew.a.Chain1 day agoVery addictive!ReplyTrashpanda1191 day agolove the playstyle and the art style definitly fun to play plus the music is the cherry on topReplyAhoOppai1 day agoreally fun game cant wait for the full gameReplyDin Xavier coding1 day agoI chose the laser eye. How do I turn the attack around? Can I even do that?Replyoverboy1 day agoHey, the laser eye gets a random direction at the start of each wave, it's one of the specificities of this attack ;)ReplyFort Kenmei1 day agoGameplay and Critique ;)Replyoverboy1 day agoThanks a lot for the awesome video and the feedback! :)ReplyTLGaby2 days agoJust to know browser progress keep getting reset.Replyoverboy1 day agoThanks for the report! Could it be due to some of your browser settings?Unfortunately, browser-based games can't always guarantee reliable local saves due to how browsers handle storage.To avoid this in the future, I recommend trying the downloadable version of the demo,  it provides a more stable environment for saving progress. :)Replyepic.Replyoleekconder2 days agoVery nice. Spent couple hours easy=) UPD: And some moreReplyMaximusR3 days agoes un juego que ya jugue en su momento cuando tenias menos cosas y ahora que esta actualizado quisiera grabarlo otra vezReplyEPIClove the spiders ♥ReplynineGardens3 days agoOkay so.... tried out a few things, and some Dev suggestions to report:
    Bigfoot is such a cool idea, and running around at that speed with like.... all THAT going on just gave me motion sickness.Summoner is hysterical fun. All hail spiders. Tomatoe's are pretty fun too.The Adept is so cool in theory, but... once you have the right build is a bit of a "standing still simulator"  Also, if you have totoms or other turrets, there's very much the question each round of "Will my circle spawn NEAR the totoms , or far from them "   I kind of wonder if the mage circle should like... fizzle out after 20 seconds and appear somewhere else. Just... something to give a bit more dynamism, and to make the original spawn point less critical.Okay: added thoughts:Watering psycotic tomatoes feels great.Being a malevolent spider with 8 arms feels amazing. Feels very good and natural."Orbital" is one of the greatest and most fun abilities in the game.  I would take this even without the damage boost.Lots of fun, but also very silly. Good job.Replydave99993 days agowith some size you can kick the totems around to reposition them towards your circle, it benefits them too, adept can choose the wand at the start and with it you have no sustain problem anyway whatever build you want to set upReplynineGardens3 days agoOh damn- only just found out you can kick the totems!Okay, yeah in this case all is well. Or at least.... I still think a moving circle could be cool, but the fact that you can move your totems over to where the circle is makes things much better.Replyjust get enough amount+size and they hit everything, bounce is overkill ReplyLost track of time 10 hours in and still hooked. Absolutely love it! Can't wait for the full releaseReplyDriftedVoid4 days agoPretty good!
    ReplyIndyot4 days agoIt's a pretty addictive game, congrats! I lowkey missed a bit of satisfaction on the weapons though.ReplyCongrats on the game! I really like the weapons that you interact with which gives it a fun spin.Reply1Soultaken4 days agoAnyone know good combos for the items?Replydave99994 days agolasers plus amount+adept some arcane for basic dmgtotems +amount+ bounce+adept optional size and arcane you can stand still in the endall shovels with crit, strength their extra souls help you snowball hard and easy probably the most straightforward and stable very good build you can beat the game with nearly anything its well balanced but this one is very strong and easy soul flask, more chests are near always must pick, the high luck value ones give you better items the free reroll is a must pick, lightning dagger is somewhat unique as it  can carry you the entire early game even if you do not get enough element damageReplydave99998 days agounderestimated totems Replylimey8 days agoi like how you made like MULTITUDES of updates on this so like as soon as i check my feed its just thisReplydave99998 days agomy best run so far,  there s a hidden mechanic that  makes weapons  you have more likely to drop?Replyoverboy8 days agoLmao, awesome — looks like a really fun build to play! Yeah, Shop RNG uses a lot of hidden tricks to help you find relevant attacks, while still allowing unrelated ones to appear. That way, you can discover unique builds and experiment freely!Replyoverboy8 days agoThank you so much for the incredible reception of the web demo on Itch, and to everyone who wishlisted the game! Many of the changes—along with much more to come in future updates—are directly based on your feedback here and on the game’s Discord.

    I’m also excited to announce that the game will release on Steam on 8 July 2025!
    Demo - Update 35Singleplayer UI: Level Up Upgrade Phase and Chest Pickup Phase UI now display the items and attacks inventoriesSingleplayer Shop: subtle animation while selecting a Buy Button
    Many Balancing tweaks
    Balancing: nerfed Life Steal in various waysBalancing: nerfed Knockback in various waysBalancing: too much items enhancing HP Max were put in the Demo, this means it was easier to get a lot of HP and to survive in the Demo due to higher ratio of items providing HP
    Added a subtle duration during which the player can still pickup Souls even if they’re slurped by the Soul Portal
    Fine tuned the color of some weapons to improve the visibility
    Balancing: Ballista don’t double their projectiles based on amount anymoreIf Player HP is Full and HP Max > 20, the player can’t be one-shot
    Bugfix: in-game achievement pop up could be displayed below other UI elements while it should always be above everything else
    Potential Bugfix for a rare bug happening in Multiplayer shop where player2 Shop sections wasn’t displayed at allRework the save system in preparation for upcoming features
    ReplyxHELLO_WORLDx10 days agocontracts on the gameReplydave999910 days agoelijah_ap10 days agoLove the art style, upgrades, controls, etc. Balance might be the only thing off about this. If you were to add anything, I would want to see more variety in the stages, similar to Vampire Survivor. Otherwise- really great.ReplyThank you so much! I’ll keep working on the balance with each update, and I appreciate the suggestion on stage variety!ReplyNetsmile10 days agoTorch IV has a problem rounding numbers in the stats hover over display. Other levels of torches workReplyoverboy10 days agoThanks, I'll fix this displayed rounding number issue soon!ReplySkeppartorsk10 days agoFor now I'd say it's fun, but lacking a bit in balance. I absolutely suck at brotatolikes. But find this one easy, so it's probably undertuned as far as difficulty is concerned. The power and availability of HP and regen items, makes you just literally not care if you get hit. Then the relatively strong armor on top and you're just too tanky for anything to feasibly ever kill you.Replyoverboy10 days agoThanks for the feedback! Sounds like tanky builds might be a bit too forgiving right now, i'll do some balancing changesReplySkeppartorsk9 days agoLife steal has similar issues too. There's also the standard issue with knockback in these kinds of games. The lack of any enemy resistance/diminishing returns, means it's way too easy to get enough knockback that enemies cannot touch you anymore. Ranged attacks are too few and far between to worry about with the current levels of sustain. Meaning you can just Stand Still and Kill way too realiably.
    Edit: Lategame with 6x Wands I'm getting so much screen shake it's triggering simulation sickness. It was due to having Pierce + Bounce. The screen shake from my projectiles bouncing off the edge of the map.Replyoverboy8 days agothanks for your feedback, it will help for the game balancing!For now I try to avoid diminishing returns by design to make sure each feature and stat is super easy to understand because I dislike when roguelike gets too opaque, I prefer that the player fully and easily undestand each of its choices, but yeah that involves a good balance to find!In future updates, Life Steal will become harder to get, Knockback will be capped at lower maximum applied values.Regarding the overall difficulty, the full version has 3 extra level of difficulties, and based on some feedbacks i have from beta testers, the balance between the 5 difficulty modes seem to be close to what i'm aiming forThere is already an option to disable screenshakes ;)Edit: Would you be interested to join the beta-test of the full game? If so please join the Discord and ping me in DM ;)ReplySkeppartorsk8 days agoI did notice that you could turn off screen shake entirely. But admittedly a lot of the visceral feel of the combat goes away when you fully disable the screen shake. But when you have too many Leeroy/knockback projectiles/bouncing projectiles. It just reaches the point where simulation sickness sets in. Wish there was something like an intensity setting, or a way for it to cap out at how often a screen shake can get triggered.
    I agree on the opaque thing. But I was more thinking something akin to how CC Diminishing Returns works in WoW. Where 1st hit = full value, 2nd hit within 10s = half value, 3rd hit = 1/4 value. Then 10s of immunity before it resets. That way you still get knockback when you pick knockback. But you can't just perma nail enemies against the wall.
    Edit: Also there's a wording issuewith how multiple pentagrams work. If you have adept pentagram and the item pentagram the wording is "when you stand inside a pentagram" But the item one gives the 20% damage ONLY and the adept one gives the adept bonuses ONLY. The wording would mean that both pentagrams should give adept bonus AND 20% damage bonus.Edit2: I'd suggest reformatting Grimorius tooltip so that the -10% armor is above the "on level up"portion. The indentation difference between the +1% speed and -10% armor is small enough that I read it as losing 10% armor on every level up.Replyoverboy8 days agoThanks a lot for the interesting insights!I nerfed HP, Lifesteal and Knockback using various techniques in the last update, along with many other changes.Just tested Pentagram/Adept and it works as expected: the 2 effects stack correctly as the wording impliedI reformatted Grimorius tooltip as you suggested ;)ReplyView more in threadBad Piggy11 days agoVery cool in it's current state. I love how much it really emphasises movement like how some active abilities need to be grabbed from around the arena to do themThat said, I think enemy projectiles could honestly stand out more. I could hardly see them at times in all the chaos.Still, I think this is a pretty solid base right now, and as always, you have a beautiful visual style, though I feel like the game suffers a little from how busy it can get. Great stuff so far thoughReplyThanks Bad Piggy! Really glad you’re enjoying the mechanics. I appreciate the feedback on projectile visibility and how busy things can get. I’ll definitely look into ways to improve those aspects. Really grateful for the kind words and thoughtful feedback!ReplyLeoLohandro11 days agoA copy of the brotato), but still fun.Replyoverboy11 days agoHey thanks a lot! Yes this game is a Brotato-like with many twists and new innovative mechanics, such as:- Equippable Boss Patterns- Minion Summoning- Growing Plant Minions with a watercan- Amount and Size stats - Physics-Based Weapons – like chained spikeballs- Kickable stuff- Playable character merge feature- Dozens and dozens of unique effectsI'm aiming for something like The Binding of Isaac meets Brotato — a deep, replayable experience full of chaotic synergies and wild builds that feel totally unique each run, with all the "being a boss fantasy and humor" deeply included in the mechanics and content :)Reply
    #noobs #are #coming #demo #free
    NOOBS ARE COMING (Demo) [Free] [Action] [Windows] [Linux]
    SirCozyCrow5 hours agoThe sound track is PEAK! I loved playing this, and my partner who normally doesn't play games like this one had a good time as well. I enjoyed the learning curve and I can't wait to play the harder difficulties.Here's a video I made, my partner jumped in for a few minutes as well.Replyso funReplyDrew.a.Chain1 day agoVery addictive!ReplyTrashpanda1191 day agolove the playstyle and the art style definitly fun to play plus the music is the cherry on topReplyAhoOppai1 day agoreally fun game cant wait for the full gameReplyDin Xavier coding1 day agoI chose the laser eye. How do I turn the attack around? Can I even do that?Replyoverboy1 day agoHey, the laser eye gets a random direction at the start of each wave, it's one of the specificities of this attack ;)ReplyFort Kenmei1 day agoGameplay and Critique ;)Replyoverboy1 day agoThanks a lot for the awesome video and the feedback! :)ReplyTLGaby2 days agoJust to know browser progress keep getting reset.Replyoverboy1 day agoThanks for the report! Could it be due to some of your browser settings?Unfortunately, browser-based games can't always guarantee reliable local saves due to how browsers handle storage.To avoid this in the future, I recommend trying the downloadable version of the demo,  it provides a more stable environment for saving progress. :)Replyepic.Replyoleekconder2 days agoVery nice. Spent couple hours easy=) UPD: And some moreReplyMaximusR3 days agoes un juego que ya jugue en su momento cuando tenias menos cosas y ahora que esta actualizado quisiera grabarlo otra vezReplyEPIClove the spiders ♥ReplynineGardens3 days agoOkay so.... tried out a few things, and some Dev suggestions to report: Bigfoot is such a cool idea, and running around at that speed with like.... all THAT going on just gave me motion sickness.Summoner is hysterical fun. All hail spiders. Tomatoe's are pretty fun too.The Adept is so cool in theory, but... once you have the right build is a bit of a "standing still simulator"  Also, if you have totoms or other turrets, there's very much the question each round of "Will my circle spawn NEAR the totoms , or far from them "   I kind of wonder if the mage circle should like... fizzle out after 20 seconds and appear somewhere else. Just... something to give a bit more dynamism, and to make the original spawn point less critical.Okay: added thoughts:Watering psycotic tomatoes feels great.Being a malevolent spider with 8 arms feels amazing. Feels very good and natural."Orbital" is one of the greatest and most fun abilities in the game.  I would take this even without the damage boost.Lots of fun, but also very silly. Good job.Replydave99993 days agowith some size you can kick the totems around to reposition them towards your circle, it benefits them too, adept can choose the wand at the start and with it you have no sustain problem anyway whatever build you want to set upReplynineGardens3 days agoOh damn- only just found out you can kick the totems!Okay, yeah in this case all is well. Or at least.... I still think a moving circle could be cool, but the fact that you can move your totems over to where the circle is makes things much better.Replyjust get enough amount+size and they hit everything, bounce is overkill ReplyLost track of time 10 hours in and still hooked. Absolutely love it! Can't wait for the full releaseReplyDriftedVoid4 days agoPretty good! ReplyIndyot4 days agoIt's a pretty addictive game, congrats! I lowkey missed a bit of satisfaction on the weapons though.ReplyCongrats on the game! I really like the weapons that you interact with which gives it a fun spin.Reply1Soultaken4 days agoAnyone know good combos for the items?Replydave99994 days agolasers plus amount+adept some arcane for basic dmgtotems +amount+ bounce+adept optional size and arcane you can stand still in the endall shovels with crit, strength their extra souls help you snowball hard and easy probably the most straightforward and stable very good build you can beat the game with nearly anything its well balanced but this one is very strong and easy soul flask, more chests are near always must pick, the high luck value ones give you better items the free reroll is a must pick, lightning dagger is somewhat unique as it  can carry you the entire early game even if you do not get enough element damageReplydave99998 days agounderestimated totems Replylimey8 days agoi like how you made like MULTITUDES of updates on this so like as soon as i check my feed its just thisReplydave99998 days agomy best run so far,  there s a hidden mechanic that  makes weapons  you have more likely to drop?Replyoverboy8 days agoLmao, awesome — looks like a really fun build to play! Yeah, Shop RNG uses a lot of hidden tricks to help you find relevant attacks, while still allowing unrelated ones to appear. That way, you can discover unique builds and experiment freely!Replyoverboy8 days agoThank you so much for the incredible reception of the web demo on Itch, and to everyone who wishlisted the game! Many of the changes—along with much more to come in future updates—are directly based on your feedback here and on the game’s Discord. I’m also excited to announce that the game will release on Steam on 8 July 2025! Demo - Update 35Singleplayer UI: Level Up Upgrade Phase and Chest Pickup Phase UI now display the items and attacks inventoriesSingleplayer Shop: subtle animation while selecting a Buy Button Many Balancing tweaks Balancing: nerfed Life Steal in various waysBalancing: nerfed Knockback in various waysBalancing: too much items enhancing HP Max were put in the Demo, this means it was easier to get a lot of HP and to survive in the Demo due to higher ratio of items providing HP Added a subtle duration during which the player can still pickup Souls even if they’re slurped by the Soul Portal Fine tuned the color of some weapons to improve the visibility Balancing: Ballista don’t double their projectiles based on amount anymoreIf Player HP is Full and HP Max > 20, the player can’t be one-shot Bugfix: in-game achievement pop up could be displayed below other UI elements while it should always be above everything else Potential Bugfix for a rare bug happening in Multiplayer shop where player2 Shop sections wasn’t displayed at allRework the save system in preparation for upcoming features ReplyxHELLO_WORLDx10 days agocontracts on the gameReplydave999910 days agoelijah_ap10 days agoLove the art style, upgrades, controls, etc. Balance might be the only thing off about this. If you were to add anything, I would want to see more variety in the stages, similar to Vampire Survivor. Otherwise- really great.ReplyThank you so much! I’ll keep working on the balance with each update, and I appreciate the suggestion on stage variety!ReplyNetsmile10 days agoTorch IV has a problem rounding numbers in the stats hover over display. Other levels of torches workReplyoverboy10 days agoThanks, I'll fix this displayed rounding number issue soon!ReplySkeppartorsk10 days agoFor now I'd say it's fun, but lacking a bit in balance. I absolutely suck at brotatolikes. But find this one easy, so it's probably undertuned as far as difficulty is concerned. The power and availability of HP and regen items, makes you just literally not care if you get hit. Then the relatively strong armor on top and you're just too tanky for anything to feasibly ever kill you.Replyoverboy10 days agoThanks for the feedback! Sounds like tanky builds might be a bit too forgiving right now, i'll do some balancing changesReplySkeppartorsk9 days agoLife steal has similar issues too. There's also the standard issue with knockback in these kinds of games. The lack of any enemy resistance/diminishing returns, means it's way too easy to get enough knockback that enemies cannot touch you anymore. Ranged attacks are too few and far between to worry about with the current levels of sustain. Meaning you can just Stand Still and Kill way too realiably. Edit: Lategame with 6x Wands I'm getting so much screen shake it's triggering simulation sickness. It was due to having Pierce + Bounce. The screen shake from my projectiles bouncing off the edge of the map.Replyoverboy8 days agothanks for your feedback, it will help for the game balancing!For now I try to avoid diminishing returns by design to make sure each feature and stat is super easy to understand because I dislike when roguelike gets too opaque, I prefer that the player fully and easily undestand each of its choices, but yeah that involves a good balance to find!In future updates, Life Steal will become harder to get, Knockback will be capped at lower maximum applied values.Regarding the overall difficulty, the full version has 3 extra level of difficulties, and based on some feedbacks i have from beta testers, the balance between the 5 difficulty modes seem to be close to what i'm aiming forThere is already an option to disable screenshakes ;)Edit: Would you be interested to join the beta-test of the full game? If so please join the Discord and ping me in DM ;)ReplySkeppartorsk8 days agoI did notice that you could turn off screen shake entirely. But admittedly a lot of the visceral feel of the combat goes away when you fully disable the screen shake. But when you have too many Leeroy/knockback projectiles/bouncing projectiles. It just reaches the point where simulation sickness sets in. Wish there was something like an intensity setting, or a way for it to cap out at how often a screen shake can get triggered. I agree on the opaque thing. But I was more thinking something akin to how CC Diminishing Returns works in WoW. Where 1st hit = full value, 2nd hit within 10s = half value, 3rd hit = 1/4 value. Then 10s of immunity before it resets. That way you still get knockback when you pick knockback. But you can't just perma nail enemies against the wall. Edit: Also there's a wording issuewith how multiple pentagrams work. If you have adept pentagram and the item pentagram the wording is "when you stand inside a pentagram" But the item one gives the 20% damage ONLY and the adept one gives the adept bonuses ONLY. The wording would mean that both pentagrams should give adept bonus AND 20% damage bonus.Edit2: I'd suggest reformatting Grimorius tooltip so that the -10% armor is above the "on level up"portion. The indentation difference between the +1% speed and -10% armor is small enough that I read it as losing 10% armor on every level up.Replyoverboy8 days agoThanks a lot for the interesting insights!I nerfed HP, Lifesteal and Knockback using various techniques in the last update, along with many other changes.Just tested Pentagram/Adept and it works as expected: the 2 effects stack correctly as the wording impliedI reformatted Grimorius tooltip as you suggested ;)ReplyView more in threadBad Piggy11 days agoVery cool in it's current state. I love how much it really emphasises movement like how some active abilities need to be grabbed from around the arena to do themThat said, I think enemy projectiles could honestly stand out more. I could hardly see them at times in all the chaos.Still, I think this is a pretty solid base right now, and as always, you have a beautiful visual style, though I feel like the game suffers a little from how busy it can get. Great stuff so far thoughReplyThanks Bad Piggy! Really glad you’re enjoying the mechanics. I appreciate the feedback on projectile visibility and how busy things can get. I’ll definitely look into ways to improve those aspects. Really grateful for the kind words and thoughtful feedback!ReplyLeoLohandro11 days agoA copy of the brotato), but still fun.Replyoverboy11 days agoHey thanks a lot! Yes this game is a Brotato-like with many twists and new innovative mechanics, such as:- Equippable Boss Patterns- Minion Summoning- Growing Plant Minions with a watercan- Amount and Size stats - Physics-Based Weapons – like chained spikeballs- Kickable stuff- Playable character merge feature- Dozens and dozens of unique effectsI'm aiming for something like The Binding of Isaac meets Brotato — a deep, replayable experience full of chaotic synergies and wild builds that feel totally unique each run, with all the "being a boss fantasy and humor" deeply included in the mechanics and content :)Reply #noobs #are #coming #demo #free
    OVERBOY.ITCH.IO
    NOOBS ARE COMING (Demo) [Free] [Action] [Windows] [Linux]
    SirCozyCrow5 hours agoThe sound track is PEAK! I loved playing this, and my partner who normally doesn't play games like this one had a good time as well. I enjoyed the learning curve and I can't wait to play the harder difficulties.Here's a video I made, my partner jumped in for a few minutes as well.Replyso funReplyDrew.a.Chain1 day ago(+1)Very addictive!ReplyTrashpanda1191 day ago(+1)love the playstyle and the art style definitly fun to play plus the music is the cherry on topReplyAhoOppai1 day ago(+1)really fun game cant wait for the full gameReplyDin Xavier coding1 day agoI chose the laser eye. How do I turn the attack around? Can I even do that?Replyoverboy1 day agoHey, the laser eye gets a random direction at the start of each wave, it's one of the specificities of this attack ;)ReplyFort Kenmei1 day agoGameplay and Critique ;)Replyoverboy1 day ago(+1)Thanks a lot for the awesome video and the feedback! :)ReplyTLGaby2 days agoJust to know browser progress keep getting reset.Replyoverboy1 day ago (2 edits) (+1)Thanks for the report! Could it be due to some of your browser settings?Unfortunately, browser-based games can't always guarantee reliable local saves due to how browsers handle storage.To avoid this in the future, I recommend trying the downloadable version of the demo,  it provides a more stable environment for saving progress. :)Replyepic.Replyoleekconder2 days ago (1 edit) (+1)Very nice. Spent couple hours easy=) UPD: And some moreReplyMaximusR3 days agoes un juego que ya jugue en su momento cuando tenias menos cosas y ahora que esta actualizado quisiera grabarlo otra vezReplyEPIClove the spiders ♥ReplynineGardens3 days ago (1 edit) (+2)Okay so.... tried out a few things, and some Dev suggestions to report: Bigfoot is such a cool idea, and running around at that speed with like.... all THAT going on just gave me motion sickness.Summoner is hysterical fun. All hail spiders. Tomatoe's are pretty fun too.The Adept is so cool in theory, but... once you have the right build is a bit of a "standing still simulator"  Also, if you have totoms or other turrets, there's very much the question each round of "Will my circle spawn NEAR the totoms (instant win), or far from them (oh no)"   I kind of wonder if the mage circle should like... fizzle out after 20 seconds and appear somewhere else. Just... something to give a bit more dynamism, and to make the original spawn point less critical.Okay: added thoughts:Watering psycotic tomatoes feels great.Being a malevolent spider with 8 arms feels amazing. Feels very good and natural."Orbital" is one of the greatest and most fun abilities in the game.  I would take this even without the damage boost.Lots of fun, but also very silly. Good job.Replydave99993 days agowith some size you can kick the totems around to reposition them towards your circle, it benefits them too, adept can choose the wand at the start and with it you have no sustain problem anyway whatever build you want to set upReplynineGardens3 days agoOh damn- only just found out you can kick the totems!Okay, yeah in this case all is well. Or at least.... I still think a moving circle could be cool, but the fact that you can move your totems over to where the circle is makes things much better.Replyjust get enough amount+size and they hit everything, bounce is overkill ReplyLost track of time 10 hours in and still hooked. Absolutely love it! Can't wait for the full releaseReplyDriftedVoid4 days agoPretty good! ReplyIndyot4 days agoIt's a pretty addictive game, congrats! I lowkey missed a bit of satisfaction on the weapons though.ReplyCongrats on the game! I really like the weapons that you interact with which gives it a fun spin. (i.e. the spike ball)Reply1Soultaken4 days agoAnyone know good combos for the items? (I just pick randomly.)Replydave99994 days ago (1 edit) (+2)lasers plus amount+adept some arcane for basic dmg (its instable to setup and only overboy starts with one) totems +amount+ bounce+adept optional size and arcane you can stand still in the endall shovels with crit, strength their extra souls help you snowball hard and easy probably the most straightforward and stable very good build you can beat the game with nearly anything its well balanced but this one is very strong and easy (realized in the end that all size was wasted on this) soul flask, more chests are near always must pick, the high luck value ones give you better items the free reroll is a must pick, lightning dagger is somewhat unique as it  can carry you the entire early game even if you do not get enough element damage (I understand that the more gimmicky things like pets and kickables give the game versatility but to min max they are not that competative)Replydave99998 days agounderestimated totems Replylimey8 days agoi like how you made like MULTITUDES of updates on this so like as soon as i check my feed its just thisReplydave99998 days ago (1 edit) (+1)my best run so far,  there s a hidden mechanic that  makes weapons  you have more likely to drop?Replyoverboy8 days ago(+2)Lmao, awesome — looks like a really fun build to play! Yeah, Shop RNG uses a lot of hidden tricks to help you find relevant attacks, while still allowing unrelated ones to appear. That way, you can discover unique builds and experiment freely!Replyoverboy8 days ago (1 edit) Thank you so much for the incredible reception of the web demo on Itch, and to everyone who wishlisted the game! Many of the changes—along with much more to come in future updates—are directly based on your feedback here and on the game’s Discord. I’m also excited to announce that the game will release on Steam on 8 July 2025! Demo - Update 35 (06 June 2025)Singleplayer UI: Level Up Upgrade Phase and Chest Pickup Phase UI now display the items and attacks inventories (useful to check the scaling of current equipped attacks for example) Singleplayer Shop: subtle animation while selecting a Buy Button Many Balancing tweaks Balancing: nerfed Life Steal in various ways (lower values gained from items) Balancing: nerfed Knockback in various ways (lower values gained, higher item rarity, lower max applied value) Balancing: too much items enhancing HP Max were put in the Demo, this means it was easier to get a lot of HP and to survive in the Demo due to higher ratio of items providing HP Added a subtle duration during which the player can still pickup Souls even if they’re slurped by the Soul Portal Fine tuned the color of some weapons to improve the visibility Balancing: Ballista don’t double their projectiles based on amount anymore (only number of ballistas scales with amount) If Player HP is Full and HP Max > 20, the player can’t be one-shot Bugfix: in-game achievement pop up could be displayed below other UI elements while it should always be above everything else Potential Bugfix for a rare bug happening in Multiplayer shop where player2 Shop sections wasn’t displayed at allRework the save system in preparation for upcoming features ReplyxHELLO_WORLDx10 days agocontracts on the gameReplydave999910 days agoelijah_ap10 days agoLove the art style, upgrades, controls, etc. Balance might be the only thing off about this. If you were to add anything, I would want to see more variety in the stages, similar to Vampire Survivor. Otherwise- really great.ReplyThank you so much! I’ll keep working on the balance with each update, and I appreciate the suggestion on stage variety!ReplyNetsmile10 days agoTorch IV has a problem rounding numbers in the stats hover over display. Other levels of torches workReplyoverboy10 days ago (1 edit) Thanks, I'll fix this displayed rounding number issue soon!ReplySkeppartorsk10 days agoFor now I'd say it's fun, but lacking a bit in balance. I absolutely suck at brotatolikes. But find this one easy, so it's probably undertuned as far as difficulty is concerned. The power and availability of HP and regen items, makes you just literally not care if you get hit. Then the relatively strong armor on top and you're just too tanky for anything to feasibly ever kill you.Replyoverboy10 days ago (1 edit) (+1)Thanks for the feedback! Sounds like tanky builds might be a bit too forgiving right now, i'll do some balancing changesReplySkeppartorsk9 days ago (2 edits) Life steal has similar issues too. There's also the standard issue with knockback in these kinds of games. The lack of any enemy resistance/diminishing returns, means it's way too easy to get enough knockback that enemies cannot touch you anymore. Ranged attacks are too few and far between to worry about with the current levels of sustain. Meaning you can just Stand Still and Kill way too realiably. Edit: Lategame with 6x Wands I'm getting so much screen shake it's triggering simulation sickness. It was due to having Pierce + Bounce. The screen shake from my projectiles bouncing off the edge of the map.Replyoverboy8 days ago (2 edits) (+1)thanks for your feedback, it will help for the game balancing!For now I try to avoid diminishing returns by design to make sure each feature and stat is super easy to understand because I dislike when roguelike gets too opaque, I prefer that the player fully and easily undestand each of its choices, but yeah that involves a good balance to find!In future updates, Life Steal will become harder to get, Knockback will be capped at lower maximum applied values.Regarding the overall difficulty, the full version has 3 extra level of difficulties, and based on some feedbacks i have from beta testers, the balance between the 5 difficulty modes seem to be close to what i'm aiming for (minus some issues like you pointed out, and of course some balancing required on specific builds and items)There is already an option to disable screenshakes ;)Edit: Would you be interested to join the beta-test of the full game? If so please join the Discord and ping me in DM ;)ReplySkeppartorsk8 days ago (4 edits) I did notice that you could turn off screen shake entirely. But admittedly a lot of the visceral feel of the combat goes away when you fully disable the screen shake. But when you have too many Leeroy/knockback projectiles/bouncing projectiles. It just reaches the point where simulation sickness sets in. Wish there was something like an intensity setting, or a way for it to cap out at how often a screen shake can get triggered. I agree on the opaque thing. But I was more thinking something akin to how CC Diminishing Returns works in WoW. Where 1st hit = full value, 2nd hit within 10s = half value, 3rd hit = 1/4 value. Then 10s of immunity before it resets. That way you still get knockback when you pick knockback. But you can't just perma nail enemies against the wall. Edit: Also there's a wording issue (or a bug) with how multiple pentagrams work. If you have adept pentagram and the item pentagram the wording is "when you stand inside a pentagram" But the item one gives the 20% damage ONLY and the adept one gives the adept bonuses ONLY. The wording would mean that both pentagrams should give adept bonus AND 20% damage bonus.Edit2: I'd suggest reformatting Grimorius tooltip so that the -10% armor is above the "on level up"portion. The indentation difference between the +1% speed and -10% armor is small enough that I read it as losing 10% armor on every level up.Replyoverboy8 days agoThanks a lot for the interesting insights!I nerfed HP, Lifesteal and Knockback using various techniques in the last update, along with many other changes.Just tested Pentagram/Adept and it works as expected: the 2 effects stack correctly as the wording impliedI reformatted Grimorius tooltip as you suggested ;)ReplyView more in threadBad Piggy11 days agoVery cool in it's current state. I love how much it really emphasises movement like how some active abilities need to be grabbed from around the arena to do themThat said, I think enemy projectiles could honestly stand out more. I could hardly see them at times in all the chaos.Still, I think this is a pretty solid base right now, and as always, you have a beautiful visual style, though I feel like the game suffers a little from how busy it can get. Great stuff so far thoughReplyThanks Bad Piggy! Really glad you’re enjoying the mechanics. I appreciate the feedback on projectile visibility and how busy things can get. I’ll definitely look into ways to improve those aspects. Really grateful for the kind words and thoughtful feedback!ReplyLeoLohandro11 days agoA copy of the brotato), but still fun.Replyoverboy11 days ago (2 edits) (+1)Hey thanks a lot! Yes this game is a Brotato-like with many twists and new innovative mechanics, such as:- Equippable Boss Patterns (active skills you can trigger by picking orbs on the map)- Minion Summoning- Growing Plant Minions with a watercan- Amount and Size stats - Physics-Based Weapons – like chained spikeballs- Kickable stuff (you can even play soccer with your minions or other co-op players)- Playable character merge feature (get the effect of 2 different characters or more at the same time)- Dozens and dozens of unique effects (turning enemies into Sheep, or Golden Statues, or both?)I'm aiming for something like The Binding of Isaac meets Brotato — a deep, replayable experience full of chaotic synergies and wild builds that feel totally unique each run, with all the "being a boss fantasy and humor" deeply included in the mechanics and content :)Reply
    0 Commentaires 0 Parts
  • Komires: Matali Physics 6.9 Released

    We are pleased to announce the release of Matali Physics 6.9, the next significant step on the way to the seventh major version of the environment. Matali Physics 6.9 introduces a number of improvements and fixes to Matali Physics Core, Matali Render and Matali Games modules, presents physics-driven, completely dynamic light sources, real-time object scaling with destruction, lighting model simulating global illuminationin some aspects, comprehensive support for Wayland on Linux, and more.

    Posted by komires on Jun 3rd, 2025
    What is Matali Physics?
    Matali Physics is an advanced, modern, multi-platform, high-performance 3d physics environment intended for games, VR, AR, physics-based simulations and robotics. Matali Physics consists of the advanced 3d physics engine Matali Physics Core and other physics-driven modules that all together provide comprehensive simulation of physical phenomena and physics-based modeling of both real and imaginary objects.
    What's new in version 6.9?

    Physics-driven, completely dynamic light sources. The introduced solution allows for processing hundreds of movable, long-range and shadow-casting light sources, where with each source can be assigned logic that controls its behavior, changes light parameters, volumetric effects parameters and others;
    Real-time object scaling with destruction. All groups of physics objects and groups of physics objects with constraints may be subject to destruction process during real-time scaling, allowing group members to break off at different sizes;
    Lighting model simulating global illuminationin some aspects. Based on own research and development work, processed in real time, ready for dynamic scenes, fast on mobile devices, not based on lightmaps, light probes, baked lights, etc.;
    Comprehensive support for Wayland on Linux. The latest version allows Matali Physics SDK users to create advanced, high-performance, physics-based, Vulkan-based games for modern Linux distributions where Wayland is the main display server protocol;
    Other improvements and fixes which complete list is available on the History webpage.

    What platforms does Matali Physics support?

    Android
    Android TV
    *BSD
    iOS
    iPadOS
    LinuxmacOS
    Steam Deck
    tvOS
    UWPWindowsWhat are the benefits of using Matali Physics?

    Physics simulation, graphics, sound and music integrated into one total multimedia solution where creating complex interactions and behaviors is common and relatively easy
    Composed of dedicated modules that do not require additional licences and fees
    Supports fully dynamic and destructible scenes
    Supports physics-based behavioral animations
    Supports physical AI, object motion and state change control
    Supports physics-based GUI
    Supports physics-based particle effects
    Supports multi-scene physics simulation and scene combining
    Supports physics-based photo mode
    Supports physics-driven sound
    Supports physics-driven music
    Supports debug visualization
    Fully serializable and deserializable
    Available for all major mobile, desktop and TV platforms
    New features on request
    Dedicated technical support
    Regular updates and fixes

    If you have questions related to the latest version and the use of Matali Physics environment as a game creation solution, please do not hesitate to contact us.
    #komires #matali #physics #released
    Komires: Matali Physics 6.9 Released
    We are pleased to announce the release of Matali Physics 6.9, the next significant step on the way to the seventh major version of the environment. Matali Physics 6.9 introduces a number of improvements and fixes to Matali Physics Core, Matali Render and Matali Games modules, presents physics-driven, completely dynamic light sources, real-time object scaling with destruction, lighting model simulating global illuminationin some aspects, comprehensive support for Wayland on Linux, and more. Posted by komires on Jun 3rd, 2025 What is Matali Physics? Matali Physics is an advanced, modern, multi-platform, high-performance 3d physics environment intended for games, VR, AR, physics-based simulations and robotics. Matali Physics consists of the advanced 3d physics engine Matali Physics Core and other physics-driven modules that all together provide comprehensive simulation of physical phenomena and physics-based modeling of both real and imaginary objects. What's new in version 6.9? Physics-driven, completely dynamic light sources. The introduced solution allows for processing hundreds of movable, long-range and shadow-casting light sources, where with each source can be assigned logic that controls its behavior, changes light parameters, volumetric effects parameters and others; Real-time object scaling with destruction. All groups of physics objects and groups of physics objects with constraints may be subject to destruction process during real-time scaling, allowing group members to break off at different sizes; Lighting model simulating global illuminationin some aspects. Based on own research and development work, processed in real time, ready for dynamic scenes, fast on mobile devices, not based on lightmaps, light probes, baked lights, etc.; Comprehensive support for Wayland on Linux. The latest version allows Matali Physics SDK users to create advanced, high-performance, physics-based, Vulkan-based games for modern Linux distributions where Wayland is the main display server protocol; Other improvements and fixes which complete list is available on the History webpage. What platforms does Matali Physics support? Android Android TV *BSD iOS iPadOS LinuxmacOS Steam Deck tvOS UWPWindowsWhat are the benefits of using Matali Physics? Physics simulation, graphics, sound and music integrated into one total multimedia solution where creating complex interactions and behaviors is common and relatively easy Composed of dedicated modules that do not require additional licences and fees Supports fully dynamic and destructible scenes Supports physics-based behavioral animations Supports physical AI, object motion and state change control Supports physics-based GUI Supports physics-based particle effects Supports multi-scene physics simulation and scene combining Supports physics-based photo mode Supports physics-driven sound Supports physics-driven music Supports debug visualization Fully serializable and deserializable Available for all major mobile, desktop and TV platforms New features on request Dedicated technical support Regular updates and fixes If you have questions related to the latest version and the use of Matali Physics environment as a game creation solution, please do not hesitate to contact us. #komires #matali #physics #released
    WWW.INDIEDB.COM
    Komires: Matali Physics 6.9 Released
    We are pleased to announce the release of Matali Physics 6.9, the next significant step on the way to the seventh major version of the environment. Matali Physics 6.9 introduces a number of improvements and fixes to Matali Physics Core, Matali Render and Matali Games modules, presents physics-driven, completely dynamic light sources, real-time object scaling with destruction, lighting model simulating global illumination (GI) in some aspects, comprehensive support for Wayland on Linux, and more. Posted by komires on Jun 3rd, 2025 What is Matali Physics? Matali Physics is an advanced, modern, multi-platform, high-performance 3d physics environment intended for games, VR, AR, physics-based simulations and robotics. Matali Physics consists of the advanced 3d physics engine Matali Physics Core and other physics-driven modules that all together provide comprehensive simulation of physical phenomena and physics-based modeling of both real and imaginary objects. What's new in version 6.9? Physics-driven, completely dynamic light sources. The introduced solution allows for processing hundreds of movable, long-range and shadow-casting light sources, where with each source can be assigned logic that controls its behavior, changes light parameters, volumetric effects parameters and others; Real-time object scaling with destruction. All groups of physics objects and groups of physics objects with constraints may be subject to destruction process during real-time scaling, allowing group members to break off at different sizes; Lighting model simulating global illumination (GI) in some aspects. Based on own research and development work, processed in real time, ready for dynamic scenes, fast on mobile devices, not based on lightmaps, light probes, baked lights, etc.; Comprehensive support for Wayland on Linux. The latest version allows Matali Physics SDK users to create advanced, high-performance, physics-based, Vulkan-based games for modern Linux distributions where Wayland is the main display server protocol; Other improvements and fixes which complete list is available on the History webpage. What platforms does Matali Physics support? Android Android TV *BSD iOS iPadOS Linux (distributions) macOS Steam Deck tvOS UWP (Desktop, Xbox Series X/S) Windows (Classic, GDK, Handheld consoles) What are the benefits of using Matali Physics? Physics simulation, graphics, sound and music integrated into one total multimedia solution where creating complex interactions and behaviors is common and relatively easy Composed of dedicated modules that do not require additional licences and fees Supports fully dynamic and destructible scenes Supports physics-based behavioral animations Supports physical AI, object motion and state change control Supports physics-based GUI Supports physics-based particle effects Supports multi-scene physics simulation and scene combining Supports physics-based photo mode Supports physics-driven sound Supports physics-driven music Supports debug visualization Fully serializable and deserializable Available for all major mobile, desktop and TV platforms New features on request Dedicated technical support Regular updates and fixes If you have questions related to the latest version and the use of Matali Physics environment as a game creation solution, please do not hesitate to contact us.
    0 Commentaires 0 Parts
  • Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 

    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks.
    To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms.
    Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsicsand assembly language. It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA. 
    Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior.
    Proving Rust program properties with Aeneas
    Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”.
    For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references.
    As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneasbecause it helps provide a clean separation between code and proofs.
    Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean, allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community.
    Compiling Rust to C supports backward compatibility  
    We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs.
    Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice, a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydicecompiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code.
    As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries, or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed.

    Microsoft research podcast

    Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness
    As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India.

    Listen now

    Opens in a new tab
    Timing analysis with Revizor 
    Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct. 
    To address this, we’re extending Revizor, a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.  
    Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel. 
    By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code.
    Verified Rust implementations begin with ML-KEM
    This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling.
    A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcryptobranch of the SymCrypt repository. We encourage users to try the Rust build and share feedback. Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings. 
    Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations. 
    As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems.
    Looking forward 
    This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library.
    Opens in a new tab
    #rewriting #symcrypt #rust #modernize #microsofts
    Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 
    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks. To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms. Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsicsand assembly language. It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA.  Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior. Proving Rust program properties with Aeneas Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”. For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references. As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneasbecause it helps provide a clean separation between code and proofs. Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean, allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community. Compiling Rust to C supports backward compatibility   We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs. Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice, a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydicecompiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code. As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries, or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed. Microsoft research podcast Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India. Listen now Opens in a new tab Timing analysis with Revizor  Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct.  To address this, we’re extending Revizor, a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.   Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel.  By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code. Verified Rust implementations begin with ML-KEM This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling. A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcryptobranch of the SymCrypt repository. We encourage users to try the Rust build and share feedback. Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings.  Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations.  As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems. Looking forward  This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library. Opens in a new tab #rewriting #symcrypt #rust #modernize #microsofts
    WWW.MICROSOFT.COM
    Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 
    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks. To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt (opens in new tab)—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms. Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsics (compiler-provided low-level functions) and assembly language (direct processor instructions). It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA.  Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior. Proving Rust program properties with Aeneas Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”. For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references. As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneas (opens in new tab) because it helps provide a clean separation between code and proofs. Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean (opens in new tab), allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community. Compiling Rust to C supports backward compatibility   We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs. Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice (opens in new tab), a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydice (opens in new tab) compiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code. As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries (via C or Rust APIs), or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed. Microsoft research podcast Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India. Listen now Opens in a new tab Timing analysis with Revizor  Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct.  To address this, we’re extending Revizor (opens in new tab), a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.   Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel.  By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code. Verified Rust implementations begin with ML-KEM This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling. A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcrypto (opens in new tab) branch of the SymCrypt repository. We encourage users to try the Rust build and share feedback (opens in new tab). Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings.  Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations.  As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems. Looking forward  This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library. Opens in a new tab
    0 Commentaires 0 Parts
  • The 2025 Complete Splunk Beginner Bundle is now 25% off

    Deal

     When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

    The 2025 Complete Splunk Beginner Bundle is now 25% off

    Neowin Deals
    ·

    Jun 14, 2025 16:00 EDT

    Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle
    Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide.
    What's Included:

    Splunk Fundamentals for Effective Management of SOC and SIEM

    Oak Academy 38 LessonsLifetime Value
    Splunk | Splunk Core Certified User Certification Prep Lab

    Oak Academy, 63 Lessons,Lifetime, Value
    Splunk | Splunk Core Certified Power User SPLK 1002 Prep

    Oak Academy, 53 Lessons, Lifetime, Value
    Splunk| Splunk Enterprise Certified Admin Certification Prep

    Oak Academy, 68 Lessons, Lifetime, Value
    Requirements

    Basic understanding of IT and networking concepts
    Familiarity with Linux and Windows operating systems
    A computer with internet access for hands-on practice

    Good to Know

    Length of time users can access this course: lifetime
    Access options: desktop or mobile
    Redemption deadline: redeem your code within 30 days of purchase
    Experience level required: all levels
    Certificate of Completion ONLY
    Updates included
    Closed captioning NOT available
    NOT downloadable for offline viewing

    Learn more about our Lifetime deals here!

    Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs but this deal can be yours for just that's a saving of For full terms, specifications, and info, click the link below.
    Although priced in U.S. dollars, this deal is available for digital purchase worldwide.

    We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs.
    Other ways to support Neowin

    Whitelist Neowin by not blocking our ads

    Create a free member account to see fewer ads

    Make a donation to support our day to day running costs

    Subscribe to Neowin - for a year, or a year for an ad-free experience

    Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce.

    Tags

    Report a problem with article

    Follow @NeowinFeed
    #complete #splunk #beginner #bundle #now
    The 2025 Complete Splunk Beginner Bundle is now 25% off
    Deal  When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. The 2025 Complete Splunk Beginner Bundle is now 25% off Neowin Deals · Jun 14, 2025 16:00 EDT Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide. What's Included: Splunk Fundamentals for Effective Management of SOC and SIEM Oak Academy 38 LessonsLifetime Value Splunk | Splunk Core Certified User Certification Prep Lab Oak Academy, 63 Lessons,Lifetime, Value Splunk | Splunk Core Certified Power User SPLK 1002 Prep Oak Academy, 53 Lessons, Lifetime, Value Splunk| Splunk Enterprise Certified Admin Certification Prep Oak Academy, 68 Lessons, Lifetime, Value Requirements Basic understanding of IT and networking concepts Familiarity with Linux and Windows operating systems A computer with internet access for hands-on practice Good to Know Length of time users can access this course: lifetime Access options: desktop or mobile Redemption deadline: redeem your code within 30 days of purchase Experience level required: all levels Certificate of Completion ONLY Updates included Closed captioning NOT available NOT downloadable for offline viewing Learn more about our Lifetime deals here! Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs but this deal can be yours for just that's a saving of For full terms, specifications, and info, click the link below. Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for a year, or a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce. Tags Report a problem with article Follow @NeowinFeed #complete #splunk #beginner #bundle #now
    WWW.NEOWIN.NET
    The 2025 Complete Splunk Beginner Bundle is now 25% off
    Deal  When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. The 2025 Complete Splunk Beginner Bundle is now 25% off Neowin Deals · Jun 14, 2025 16:00 EDT Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide. What's Included: Splunk Fundamentals for Effective Management of SOC and SIEM Oak Academy 38 Lessons (3.5h) Lifetime $20.00 Value Splunk | Splunk Core Certified User Certification Prep Lab Oak Academy, 63 Lessons (6h),Lifetime, $20.00 Value Splunk | Splunk Core Certified Power User SPLK 1002 Prep Oak Academy, 53 Lessons (5.5h), Lifetime, $20.00 Value Splunk| Splunk Enterprise Certified Admin Certification Prep Oak Academy, 68 Lessons (8.5h), Lifetime, $20.00 Value Requirements Basic understanding of IT and networking concepts Familiarity with Linux and Windows operating systems A computer with internet access for hands-on practice Good to Know Length of time users can access this course: lifetime Access options: desktop or mobile Redemption deadline: redeem your code within 30 days of purchase Experience level required: all levels Certificate of Completion ONLY Updates included Closed captioning NOT available NOT downloadable for offline viewing Learn more about our Lifetime deals here! Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs $80, but this deal can be yours for just $19.99, that's a saving of $60. For full terms, specifications, and info, click the link below. Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for $14 a year, or $28 a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce. Tags Report a problem with article Follow @NeowinFeed
    0 Commentaires 0 Parts