Tuesday, 4 February 2025

Cruise Laying Off Half Its Workforce

Cruise is laying off half of its software, the last turn of events for a once promising self-driving company that has had one setback after another.

According to an email seen by TechCrunch, Cruise President Craig Glidden informed the company’s roughly 2,100 employees of the news.

“As a result of the change in strategy we announced in December, today we will part with nearly 50% of our Cruise employee base, through a reduction in force,” the email from Glidden reads. “Anyone who has been through a reduction knows that days like this are extremely difficult, and today is no different. With our move away from the ride-hail business and toward providing autonomous vehicles to customers alongside GM, our staffing and resource needs have dramatically changed. Today’s actions align our teams to our new needs, and focus our efforts on continuing to build world-class AV technology.”

The layoffs cap a year of major changes for GM-owned Cruise. One of the company’s robotaxis was involved in a tragic accident in late 2023 in which the vehicle failed to avoid and hit a pedestrian that had already been struck by a hit-and-run driver. The company’s operational permits were rescinded in the the aftermath, over concerns about its safety.

While the Cruise eventually regained legal authorization to resume testing, the company never really recovered from the incident, and GM cut off funding in December 2024.

“GM is committed to delivering the best driving experiences to our customers in a disciplined and capital efficient manner,” said Mary Barra, chair and CEO of GM. “Cruise has been an early innovator in autonomy, and the deeper integration of our teams, paired with GM’s strong brands, scale, and manufacturing strength, will help advance our vision for the future of transportation.”

GM made it clear that Cruise personnel would be rolled into the company’s broader technical teams, but overlap was bound to be a factor. As a result, it’s not surprising the company is laying off as many employees as it is.

Given the number of companies working on self-driving tech, it’s a safe bet many of those employees will be able to find work with some of Cruise’s competitors.



from WebProNews https://ift.tt/5FjHydP

Microsoft Doubles Down On Efforts to Block Unsupported Windows 11 Upgrades

Microsoft appears to be doubling down on its intention to block Windows 11 from being installed on older hardware, flagging third-party upgrade tools as malware.

Microsoft has long maintained that Windows 11 would leave many PCs behind, thanks to its strict TPM 2.0 requirement. As a result, hundreds of millions of PCs are destined for the landfill, many of them fairly recent models with years of life left. The company appeared to soften its stance in mid-December, even providing instructions on how to install Windows 11 on unsupported machines, even if the company did not recommend doing so.

This PC doesn’t meet the minimum system requirements for running Windows 11 – these requirements help ensure a more reliable and higher quality experience. Installing Windows 11 on this PC is not recommended and may result in compatibility issues. If you proceed with installing Windows 11, your PC will no longer be supported and won’t be entitled to receive updates. Damages to your PC due to lack of compatibility aren’t covered under the manufacturer warranty. By selecting Accept, you are acknowledging that you read and understand this statement.

Despite receiving praise for its reversal, Microsoft appears to be doing yet another about-face, this time doubling down on its opposition to Windows 11 on unsupported hardware. First spotted by Neowin, the Microsoft support page no longer discusses installing Windows 11 outside of officially supported hardware.

To make matters even worse for users with older computers, Microsoft appears to be taking measures against third-party tools that are designed to help users install Windows 11 on their unsupported machines. Also spotted by Neowin, Microsoft is now flaggin the Flyby11 utility as malware, blocking it from running. Ironically, Flyby11 utilizes the same Registry tweak that Microsoft’s not deleted instructions initially provided.

Flyby11’s GitHub release notes makes clear that users can safely ignore the malware warning and proceed with the installation.

Important Notes: Microsoft does not officially support this method, but it still works as expected

The app is now flagged as PUA:Win32/Patcher by Microsoft Defender. You can safely ignore this if you wish to proceed with the upgrade. I will contact Microsoft to verify whether this is an official classification or a false positive

Microsoft’s change of heart is an unfortunate development for users with older—and some not so older—hardware, and will see million of PCs prematurely thrown out.



from WebProNews https://ift.tt/g1nRJXx

Verizon Offers Google One AI Premium Half-Price

Verizon has unveiled its latest perk for wireless customers, bundling Google One AI Premium for $10/mo, half the standard price.

Verizon’s deal with Google is an industry first, with the wireless carrier being the first of offer an advanced AI, let alone at such an affordable price.

Verizon isn’t just keeping up with the future — we’re building it. Being the first U.S. wireless provider to offer an AI-powered perk shows how serious we are about leading the way in innovation. And the value? Unmatched.

For just $10 a month, you’re unlocking your pass to Google’s next-gen AI with Gemini Advanced, Gemini in Google apps like Gmail and Docs, plus priority access to Google’s newest AI solutions — from new features to experimental models. These tools can completely transform how you work, learn and create. Whether you’re a busy professional looking for ways to save time, a student tackling big projects, or someone who just likes to experiment, this perk gives you tools that take your productivity and creativity to the next level.

“As the first U.S. wireless provider to offer an AI-powered perk at an incredible value, we’re putting the future of AI directly into our customers’ hands, making everyday tasks easier via Google One AI Premium,” said Sowmyanarayan Sampath, CEO Verizon Consumer. “We’ll continue to bring our mobile and internet customers new deals and even more ways to personalize their plans based on how they live, work and play.”

Interestingly, the Verizon plan appears to come with all the features of standard Google One AI Premium plan, including the 2 TB of cloud storage.

Get more done, faster with your personal tutor, analyst or coach. With Gemini Advanced, it’s like having a super-smart assistant by your side 24/7 to help you tackle tasks and spend more time on what’s most important. You can use Gemini in the Google apps you already know and love like Gmail, Docs, Meet, Slides and Sheets to write a draft, take meeting notes, create stunning presentations, visualize data and more.

Streamline your daily tasks. Create and use custom AI experts (“Gems”), for any topic, turning Gemini into your personal brainstorming partner, study helper or planning assistant.

Save hours on research. Analyze whole books and stacks of articles (up to 1,500 pages) or use Deep Research to browse hundreds of sites and create comprehensive reports in minutes to bring you up to speed on a topic.

Get more space for what’s important. With 2 TB of cloud storage, you’ll have plenty of space to keep your files, photos, and videos safely backed up to the cloud. Forget about running out of room or losing track of important stuff.

The announcement is good news for Google as the company continues to improve Gemini and compete with OpenAI and Anthropic.



from WebProNews https://ift.tt/Fy9ojSi

U.S. Tariffs May Cost Starlink $100 Million Ontario Contract

As a potential trade war looms between the U.S. and Canada, Elon Musk’s Starlink may lose a $100 million contract with Ontario.

U.S. President Donald Trump has promised steep tariffs on Candada, Mexico, and China. Ironically, Trump has promised the steepest tariffs—of 25%—on Canada and Mexico, two of the U.S.’ closest allies. In contrast, China is slated to be hit with a 10% tariff, despite the longstanding issues between the two countries.

Given Elon Musk’s position at the center of U.S. fiscal policy under Trump’s second term, it’s little wonder that his Starlink is a target for retaliation. Ontario Premier Doug Ford initially said his province would cancel its contract with Starlink in response to the tariffs, but has since agreed to a 30-day reprieve that mirrors the 30-day reprieve Trump and Canadian Prime Minister Justin Trudeau agreed to for the tariffs.

Premier Ford announced his plans in an X post.

We have some good news today. We have temporarily averted tariffs that would have severely damaged our economy, giving time for more negotiation and time for cooler heads to prevail. Thank you to the countless workers, union leaders, businesses and everyday proud Canadians who rallied together to make this happen.

With the U.S. pausing tariffs, Ontario will also pause our retaliatory measures. If President Trump proceeds with tariffs, we won’t hesitate to remove American products off LCBO shelves or ban American companies from provincial procurement.

Make no mistake, Canada and Ontario continue to stare down the threat of tariffs. Whether it’s tomorrow, in a month or a year from now when we’re renegotiating the United States-Mexico-Canada Agreement, President Trump will continue to use the threat of tariffs to get what he wants. We’re already feeling the impact. So long as our trading relationship with our largest trading partner is up in the air, we will continue to see many potential projects frozen and projects that were already under way put at risk.

Canada and the U.S. need to remain united and focused on the real trade war we’re fighting, with China. If we want to win, we need to fight together – not each other.

While Trump and his supporters are quick to tout tariffs as some kind of magic bullet that will fix the U.S. economy and solve all sorts of problems, the reality is far more complicated and will result in very real damage being done to businesses on both sides of such tariffs.



from WebProNews https://ift.tt/cySklrp

Monday, 3 February 2025

Sophos Completes Secureworks Acquisition

Sophos announced it has completed its acquisition of Secureworks, with Monday, February 3 serving as the first day for the combined company.

Secureworks’ Counter Threat Unit (CTU) is one of the leading cybersecurity intelligence platforms designed to identify and combat advanced persistent threats (APT) and state sponsored attackers. The company’s platform will help round out Sophos’ already impressive lineup of cybersecurity options.

Sophos says the integration of products and platforms will lead to an improved experience for customers of both companies.

To share just one example, we will combine the MDR/XDR and other key capabilities of both organizations into a single, unified security operations platform that enables us to deliver unparalleled cyber defenses for today’s diverse IT environments, including hundreds of built-in integrations. This advanced platform will further enhance visibility, detection and response for mitigating cyberattacks, setting a new standard for security operations.

Sophos says the company is committed to a seamless transition for customers of both companies.

We deeply value the trust that customers have placed in Sophos and Secureworks and we are unwavering in our commitment to continue to defend them against today’s advanced threats while maintaining the high levels of service they already value. In addition to continuing to deliver our current set of services and technologies to Sophos and Secureworks customers, our customer experience teams will ensure seamless, continued support during the integration period. Please reach out to your Sophos representative with any questions.



from WebProNews https://ift.tt/v031Ht7

Senator Wyden Sounds Alarm Over DOGE Access to Full U.S. Treasury System

Senator Ron Wyden is sounding the alarm over Elon Musk’s Depart of Government Efficiency (DOGE) being granted full access to the U.S. Treasury systems.

In a post on Bluesky, Senator Wyden said Treasury Secretary Scott Bessent has reportedly granted DOGE full access to the U.S. Treasury systems.

NEW: Sources tell my office that Treasury Secretary Bessent has granted DOGE full access to this system. Social Security and Medicare benefits, grants, payments to government contractors, including those that compete directly with Musk’s own companies. All of it.

In a letter to the Secretary Bessent, Wyden demands answers, especially in the context of concerns about various payments being shut down in recend days.

I write regarding disturbing reports that officials associated with Elon Musk and the socalled U.S. Department of Government Efficiency (“DOGE”) attempted to gain access to systems that control payments to millions of American citizens, including Social Security, Medicare and tax refunds.1 A confrontation over access apparently resulted in the abrupt resignation of David Lebryk, a career non-partisan Treasury official who recently had been named acting Secretary of the Treasury by President Trump. These reports are particularly concerning given incidents earlier this week in which Medicaid portals in all 50 states were shut down along with other crucial payment programs, following the Trump Administration illegally issuing an order to freeze all grant and loan payments.

Senator Wyden also points out the inherent conflict in DOGE personnel having access to sensitive financial and payout information for companies that include those competing against Musk’s own companies.

As you are aware, the Bureau of the Fiscal Service’s payment systems control the flow of more than $6 trillion in annual payments to households, businesses and other entities nationwide. These payment systems process more than a billion payments annually and are responsible for the distribution of Social Security and Medicare benefits, tax refunds, payments to federal employees and contractors, including competitors of Musk-owned companies, and thousands of other functions.

The letter goes on to emphasize the fiscal challenges the U.S. government faces, as well as the importance of it continuing to pay its bills, including to servicemen and women.

To put it bluntly, these payment systems simply cannot fail, and any politically-motivated meddling in them risks severe damage to our country and the economy. I am deeply concerned that following the federal grant and loan freeze earlier this week, these officials associated with Musk may have intended to access these payment systems to illegally withhold payments to any number of programs. I can think of no good reason why political operators who have demonstrated a blatant disregard for the law would need access to these sensitive, mission-critical systems … The federal government is in a financially precarious position, currently utilizing accounting maneuvers to continue paying its bills since it reached the debt limit at the beginning of the year. I am concerned that mismanagement of these payment systems could threaten the full faith and credit of the United States.”

Whether intentional or unintentional, failure of these payment systems could stop Social Security checks from being sent to retirees who need to pay bills and buy food and drugs. It could stop paychecks from being sent to our troops and their families. As you well know, Americans are in the middle of tax filing season, with many counting on tax refunds that they are legally owed by the government. Most importantly, the federal government is in a financially precarious position, currently utilizing accounting maneuvers to continue paying its bills since it reached the debt limit at the beginning of the year. I am concerned that mismanagement of these payment systems could threaten the full faith and credit of the United States.

Accordingly, I am deeply concerned by the possibility that Elon Musk and a cadre of other unknown DOGE personnel are seeking to gain access to and potentially control the Fiscal Service’s payment systems in order to carry out a political agenda that clearly involves violating the law. It appears that Musk’s behavior is forcing out highly qualified and experienced career public servants in order to get his way and fulfill Trump’s goal of eviscerating the federal budget, including potentially by cutting social security and Medicare benefits for millions of Americans who are already struggling to pay their bills or buy groceries.

“To put it bluntly, these payment systems simply cannot fail, and any politically-motivated meddling in them risks severe damage to our country and the economy,” Wyden writes. “I am deeply concerned that following the federal grant and loan freeze earlier this week, these officials associated with Musk may have intended to access these payment systems to illegally withhold payments to any number of programs. I can think of no good reason why political operators who have demonstrated a blatant disregard for the law would need access to these sensitive, mission-critical systems … The federal government is in a financially precarious position, currently utilizing accounting maneuvers to continue paying its bills since it reached the debt limit at the beginning of the year. I am concerned that mismanagement of these payment systems could threaten the full faith and credit of the United States.”

Sentaor Wyden also points out the potential national security risk posed by Musk’s access to U.S. Treasury data, especially given his close ties with China.

The press has previously reported that Musk was denied a high-level clearance to access the government’s most sensitive secrets. I am concerned that Musk’s enormous business operation in China — a country whose intelligence agencies have stolen vast amounts of sensitive data about Americans, including U.S. government employee data by hacking U.S. government systems — endangers U.S. cybersecurity and creates conflicts of interest that make his access to these systems a national security risk.

Conclusion

Elon Musk may be a brilliant engineer and businessman, but Senator Wyden makes a strong case that there are legitimate concerns about he and his department being given access to such sensitive data.

Further complicating the issue is Musk’s track record, especially with his acquisition of Twitter. Musk showed little to no regard for previous agreements and contracts that Twitter was legally bound by, whether in the form of lease agreements, compensation contracts, or cloud computing agreements. As a result, Twitter/X defaulted on any number of agreements and suffered significant reputational damage as a result.

While recklessly managing a business he purchased and took private is well within Musk’s prerogative, the argument can be made that one should demonstrate far more maturity, responsibility, and restraint when conducting the finances of a government that millions of people rely on.



from WebProNews https://ift.tt/CPWyaLX

XRP Might be Ready to Reconquer Levels not Recorded in the Past Three Years

Like all other cryptocurrencies, XRP started 2024 in high spirits but then ultimately lost momentum and became somewhat stagnant for a while. At the moment, XRP is trending bearish as the 50-day moving average remains sloping down. The 200-day moving average has been going up since July 21st, showing that the trend has the potential to stay strong in the long term. The XRP price prediction 2030 is relatively optimistic as a result, with the relative strength index being firmly positioned in the neutral zone, between 30 and 70.

An overview 

The XRP market is positioned for a price surge that is set to occur between August and October. Analysts consider the reason for this to be a breakout on the charts, as well as whale activity and the legal battles between regulators and crypto exchanges coming to an end. This shows that the ecosystem has started evolving and is ready to enter a phase of consolidation after the uncertainty that has dominated the marketplace over the past couple of years. As part of this growth, there’s a possibility that the XRP/USD pair will be able to record values that are near or even potentially above $1. This level hasn’t been achieved since 2021, so returning to it seems quite difficult for investors. However, with the right price movements, it is definitely not impossible. 

The breakout 

Consulting price charts is one of the most important things for cryptocurrency investors since they provide a more complete and comprehensive view of the ways in which values are bound to change. Savvy investors know how to read and estimate the movements more accurately, so if you’re new to this trading sector, it is best to heed their advice until you develop your skill set. XRP’s weekly chart currently shows that a symmetrical triangle has been in the making ever since 2018. Its main characteristic is the appearance of converging trend lines that are capable of compressing price action. 

Right now, the coin is testing the upper trendline resistance of this pattern, going for a successful breakout in order to go toward the following resistance level. Ideally, these movements could be completed in the upcoming months. But in order for this to become a reality, XRP needs to go above the $0.86 threshold. That is nearly 50% higher than its current prices, a difficult but not insurmountable barrier to deal with. A similar scenario occurred between January and March 2022 and then again in July 2024. 

Bullish run 

In spite of these apparent setbacks, most investors remain convinced that a bullish run is just around the corner. Technical indicators have so far supported this prediction, meaning that a price spike is not just the result of investors daydreaming about growth but rather an objective truth that can be verified by metrics and analysis. The RSI comes into play once more, showing a rebound after being stuck around the 50 level for a while. This clearly indicates that buying momentum is forming at the moment. Rising trading activity is also visible from the volume profile, with these movements typically being precursors to sustained price movements.

While the next bullish run might not yet be obvious to see, investors should nonetheless be ready for it. Coming up with a comprehensive strategy that keeps your portfolio stable and guarantees gains should be your top priority, but it’s impossible to achieve this goal unless you do your research and keep an eye out for market movements. 

Accumulation 

In the Bitcoin world, the accumulation stage refers to the moment when the prices reach the local bottom level, and so investors start buying in larger quantities. This occurs because the most basic rule of trading crypto is that you need to buy low and sell high. The same thing is happening right now, with data showing that many BTC users have accumulated large numbers of tokens over the last few weeks. What makes the current scenario even more interesting than others is that it is mostly whale investors who have been growing their lists of holdings. 

Members of the richest cohort, the investors holding more than a billion native tokens, have grown by almost 2% in 2024. This number is the direct correspondent of the drop recorded in the cohort that holds between 100 million and 1 billion as part of their XRP balance. The whales holding between one and ten million XRP have also been buying more tokens than before in order to consolidate their portfolios. This data is typically regarded as a bullish signal, as large investors generally grow their holdings in anticipation of higher price levels in the future. 

At the same time, they are also leveraging market influence in order to facilitate the development and continuation of these trends. 

Regulations 

2023 was a difficult year for cryptocurrencies as a result of the challenging regulatory landscape. US lawmakers wanted to find a way to ensure that the crypto space will be easier to navigate as a whole and that the risk of losing tremendous amounts of capital as a result of mismanagement is averted. However, it is easier said than done since the crypto space is entirely new for the financial landscape. That makes it more difficult to deal with, as it’s unclear what is the best place to start. The uncertainty created by this situation has impacted the market at a fundamental level, causing prices to plummet or stagnate. 

Yet, it seems now that this challenging situation could be coming to an end as a result of a potential settlement. XRP was not designated as a security when sold on exchanges but is considered one when it is sold to institutional investors who meet the conditions of the Howey test. This is a US legal framework outlined by the Supreme Court to determine if a transaction qualifies as an investment contract or if it should be subjected to regulations instead. Four criteria are taken into consideration, including the expectations of profit and reliance on efforts from others. 

If regulatory issues reach a favorable settlement once and for all, this will bring more clarity to the XRP environment and boost the price as well. 

To sum up, the outlook for the XRP marketplace looks optimistic, but it’s essential that the community remains attentive. Don’t make any impulsive decisions, or you could find yourself in a situation where the losses far surpass the gains. 



from WebProNews https://ift.tt/WVaOYu9

Google Relies On AI-Assist Threat Detection to Keep Android Safe

Google has released a new security blog post, detailing how the company worked to keep Android and Google Play safe from bad actors during 2024.

According to the company, Google blocked 2.36 million apps from being published because they violated Google Play policies. The company also banned more than 158,000 developer accounts for attempting to publish harmful apps. In addition, Google also stopped 1.3 million apps from gaining excess or unnecessary access to users’ sensitive data.

The company broke down exactly how it managed to accomplish such impressive measures, with AI playing a major role.

To keep out bad actors, we have always used a combination of human security experts and the latest threat-detection technology. In 2024, we used Google’s advanced AI to improve our systems’ ability to proactively identify malware, enabling us to detect and block bad apps more effectively. It also helps us streamline review processes for developers with a proven track record of policy compliance. Today, over 92% of our human reviews for harmful apps are AI-assisted, allowing us to take quicker and more accurate action to help prevent harmful apps from becoming available on Google Play.

Google also worked heavily with developers to less apps’ reliance on sensitive user data.

To protect user privacy, we’re working with developers to reduce unnecessary access to sensitive data. In 2024, we prevented 1.3 million apps from getting excessive or unnecessary access to sensitive user data. We also required apps to be more transparent about how they handle user information by launching new developer requirements and a new “Data deletion” option for apps that support user accounts and data collection. This helps users manage their app data and understand the app’s deletion practices, making it easier for Play users to delete data collected from third-party apps.

We also worked to ensure that apps use the strongest and most up-to-date privacy and security capabilities Android has to offer. Every new version of Android introduces new security and privacy features, and we encourage developers to embrace these advancements as soon as possible. As a result of partnering closely with developers, over 91% of app installs on the Google Play Store now use the latest protections of Android 13 or newer.

Google also touted Google Play’s multi-layered protection features.

To create a trusted experience for everyone on Google Play, we use our SAFE principles as a guide, incorporating multi-layered protections that are always evolving to help keep Google Play safe. These protections start with the developers themselves, who play a crucial role in building secure apps. We provide developers with best-in-class tools, best practices, and on-demand training resources for building safe, high-quality apps. Every app undergoes rigorous review and testing, with only approved apps allowed to appear in the Play Store. Before a user downloads an app from Play, users can explore its user reviews, ratings, and Data safety section on Google Play to help them make an informed decision. And once installed, Google Play Protect, Android’s built-in security protection, helps to shield their Android device by continuously scanning for malicious app behavior.

While the Play Store offers best-in-class security, we know it’s not the only place users download Android apps – so it’s important that we also defend Android users from more generalized mobile threats. To do this in an open ecosystem, we’ve invested in sophisticated, real-time defenses that protect against scams, malware, and abusive apps. These intelligent security measures help to keep users, user data, and devices safe, even if apps are installed from various sources with varying levels of security.

Google Play Protect automatically scans every app on Android devices with Google Play Services, no matter the download source. This built-in protection, enabled by default, provides crucial security against malware and unwanted software. Google Play Protect scans more than 200 billion apps daily and performs real-time scanning at the code-level on novel apps to combat emerging and hidden threats, like polymorphic malware. In 2024, Google Play Protect’s real-time scanning identified more than 13 million new malicious apps from outside Google Play1.

Google’s 2024 Revelations Are Good News for Users

Google’s revelations regarding Google Play and Android security in 2024 is good news for its users. Apple has long been known as the privacy option when it comes to mobile ecosystems. Google, on the other hand, has repeatedly been accused of abusing user privacy.

While it’s certainly reassuring to see how many malicious apps and developers Google successfully blocked, it’s also good to see the company take definitive steps to stop apps from accessing excessive or unnecessary sensitive user data.

As the world’s largest mobile operating system, Android is used by billions of individuals. Unfortunately, the operating system is built and maintained by the world’s largest advertising company, meaning it also serves as a way for Google to make money off of its users via their data and serving them ads.

Seeing Google take measures to improve privacy and limit app access to sensitive data is a win for users—even if the company still has a ways to go before it matches Apple.



from WebProNews https://ift.tt/MK1wYQO

Sunday, 2 February 2025

Microsoft Kills Its Microsoft Defender VPN for Individuals & Families

Microsoft has made a move that is sure to ruffle some features, eliminating its VPN service for Microsoft 365 Personal and Family subscriptions.

Microsoft recently raised the price of its Microsoft 365 subscriptions, but that hasn’t stopped the company from stripping away an important feature from the Personal and Family plan. The company previously offered a VPN as part of its Defender package, giving users an alternative to paid options from other companies.

The company announced the change in a support article, saying it the VPN option will go away February 28, 2025. The company says it made the decision after evaluating the feature’s usage and effectiveness.

Our goal is to ensure you, and your family remain safer online. We routinely evaluate the usage and effectiveness of our features. As such, we are removing the privacy protection feature and will invest in new areas that will better align to customer needs.

The company touted the benefits Defender continues to provide for Personal and Family plans.

Microsoft Defender continues to provide data and device protection, identity theft and credit monitoring (US only), plus threat alerts to keep you safer online. Microsoft Defender requires a Microsoft 365 Personal or Family subscription.

Microsoft 365 Personal: Your Microsoft 365 subscription enables you to protect up to five devices. US subscribers can monitor their credit and 60+ types of personal info, get 24/7 identity theft support, and up to $1 million identity insurance coverage for restoration-related legal and expert fees & up to $100,000 for lost funds1 recovery.

Microsoft 365 Family: Your Microsoft 365 subscription enables you to protect up to 5 devices per person. US subscribers can activate identity theft monitoring, for each family member including 60+ types of data and credit score, get 24/7 identity theft support, and up to $1 million identity insurance coverage for restoration-related legal and expert fees & up to $100,000 for lost funds1 recovery.

Microsoft also said Defender for iOS will continue to offer a VPN, but it is different from what was offered in the Personal and Family plans.

Defender for iOS users, please note, web protection (anti-phishing) on iOS uses a VPN to help keep you safer from harmful links. You will continue to see a VPN used for the purposes of web protection and this local (loop-back) VPN is different from the privacy protection feature.

Users looking for an affordable VPN that is widely considered to be the best on the market should take a look at Mullvad as a replacement option.



from WebProNews https://ift.tt/juA6wlg

OpenAI Releases o3-mini, a STEM-Focused Reasoning Model

OpenAI has released o3-mini, a new AI model in its reasoning series that focuses on STEM capabilities, especially coding, math, and science.

The AI firm announced the new AI model in a blog post.

OpenAI o3-mini is our first small reasoning model that supports highly requested developer features including function calling⁠(opens in a new window), Structured Outputs⁠(opens in a new window), and developer messages⁠(opens in a new window), making it production-ready out of the gate. Like OpenAI o1-mini and OpenAI o1-preview, o3-mini will support streaming⁠(opens in a new window). Also, developers can choose between three reasoning effort⁠(opens in a new window) options—low, medium, and high—to optimize for their specific use cases. This flexibility allows o3-mini to “think harder” when tackling complex challenges or prioritize speed when latency is a concern. o3-mini does not support vision capabilities, so developers should continue using OpenAI o1 for visual reasoning tasks. o3-mini is rolling out in the Chat Completions API, Assistants API, and Batch API starting today to select developers in API usage tiers 3-5⁠(opens in a new window).

OpenAI says its o1 models remains its flagship reasoning model, but o3-mini provides a specialized experience for those that need it.

In ChatGPT, o3-mini uses medium reasoning effort to provide a balanced trade-off between speed and accuracy. All paid users will also have the option of selecting o3-mini-high in the model picker for a higher-intelligence version that takes a little longer to generate responses. Pro users will have unlimited access to both o3-mini and o3-mini-high.

Interestingly, the o3-mini model outperforms o1 in some situations, especially within the STEM arena.

OpenAI o3-mini Live Coding – Credit OpenAI

Similar to its OpenAI o1 predecessor, OpenAI o3-mini has been optimized for STEM reasoning. o3-mini with medium reasoning effort matches o1’s performance in math, coding, and science, while delivering faster responses. Evaluations by expert testers showed that o3-mini produces more accurate and clearer answers, with stronger reasoning abilities, than OpenAI o1-mini. Testers preferred o3-mini’s responses to o1-mini 56% of the time and observed a 39% reduction in major errors on difficult real-world questions. With medium reasoning effort, o3-mini matches the performance of o1 on some of the most challenging reasoning and intelligence evaluations including AIME and GPQA.

OpenAI o3-mini Math – Credit OpenAI
OpenAI o3-mini Science – Credit OpenAI
OpneAI o3-mini Coding – Credit OpenAI
OpenAI o3-mini Software Development – Credit OpenAI

OpenAI also touts the speed and efficiency of the o3-mini model.

With intelligence comparable to OpenAI o1, OpenAI o3-mini delivers faster performance and improved efficiency. Beyond the STEM evaluations highlighted above, o3-mini demonstrates superior results in additional math and factuality evaluations with medium reasoning effort. In A/B testing, o3-mini delivered responses 24% faster than o1-mini, with an average response time of 7.7 seconds compared to 10.16 seconds.

The o3-mini models continues OpenAI’s efforts to offer a variety of AI models, tuned to specific tasks and uses.



from WebProNews https://ift.tt/3ydDPBt

Saturday, 1 February 2025

Microsoft Kills Off Unlicensed OneDrive Accounts

Microsoft is cracking down on unlicensed OneDrive accounts, saying it will archive them after 90 days, in the interest of cybersecurity.

In an online document, Microsoft says unlicensed accounts within an organization—while common—pose a significant security risk.

As an IT administrator, you might encounter situations where some of your users have unmanaged and unlicensed OneDrive accounts within your organization. Unlicensed OneDrive accounts can pose security and compliance risks, as well as create confusion and duplication of files.

As a result, the company says such accounts will be archived and become inaccessible, beginning in early 2025.

Beginning January 27, 2025, any OneDrive user account that has been unlicensed for longer than 90 days becomes inaccessible to admins and end users. The unlicensed account is automatically archived, viewable via admin tools, but remains inaccessible until administrators take action on them.”

Unfortunately, IT admins may not know how to properly track unlicensed OneDrive account, since they’re not associated with a valid account by default. Unlicensed accounts can also appear for a number of reasons, including an expired license, or an account that was never assigned a license.

Microsoft does provide a way for admins to identify unlicensed accounts so they can take the necessary steps before the deadline.

You can identify unlicensed OneDrive accounts using the SharePoint admin center to generate reports on unlicensed accounts. The following steps show how to use the SharePoint admin center to generate a report of unlicensed OneDrive accounts:

  • Sign in to the SharePoint admin center with your work or school account.
  • Go to Reports and select User reports.
  • Under OneDrive usage, select Unlicensed users.
  • You can download the report as a CSV file.
  • Starting January 2025, an interactive UI will be available. You can select a username to view the details.

The report shows the username, email address, account type, and last activity date of each unlicensed OneDrive account.

Once unlicensed accounts have been identified, a license can be assigned to them, they can be deleted, or they can be proactively archived before the deadline.



from WebProNews https://ift.tt/UJeVdi6

Apple Abandons Augmented Reality Glasses

Apple seems to be on a run of unrealized ideas, with its augmented reality (AR) glasses rumored to be the company’s latest dead-end project.

Since the tragic passing of Steve Jobs, as well as the departure of Sir Jony Ive, Apple has been looking for its “next big thing.” Known for its innovation, the company revolutionized the computer, smartphone, tablet, and music industries. While that track record is a hard act to follow, the company seems to be struggling more than one would expect to deliver the next game-changing product.

According to Bloomberg’s Mark Gurman, Apple has pulled the plug on its AR glasses, which were designed to pair with its Mac computers. Unlike competing products, Apple’s glass would have required a Mac connection. The glasses were seen as a way to apply the knowledge gained from the Vision Pro toward a more affordable, more approachable device.

As Gurman points out, the Vision Pro is an incredible device, but its high price tag and unclear role has led to slower adoption than Apple hoped. The company has reportedly been working on a cheaper version, one executives hope will address the device’s failings.

The AR glasses join Project Titan, Apple’s much-hyped attempt to build autonomous vehicles. As multiple starts and direction changes, Apple finally killed the project in Febuary 2024.

Tim Cook’s Legacy and the Shadow of Jobs

By all measurable metrics, Tim Cook has been an outstanding CEO. A logistical genius, Apple has reached previously unimaginable heights under his stewardship.

Despite his successes, it can’t be easy following Jobs. Known for his creative genius and design spirit, Jobs had an uncanny knack for understanding what customers wanted and recognizing a game-changing idea before anyone else. Once he saw it, he was able to market it like no other.

No matter how much Cook drives Apple toward financial success, it’s not hard to imagine the pressure he must feel to deliver at least one major, category-defining product during his tenure.

Only time will tell if the Vision Pro will be that product, or if Apple will pivot to something else in its quest for “the next big thing.”



from WebProNews https://ift.tt/hXQGilU

Nearly One-Third of Dutch Tesla Owners May Sell Over Elon Musk

Data out of the Netherlands is bad news for Elon Musk and Tesla, with nearly one-third of Dutch customers considering selling their vehicles because of Musk.

Musk has been mired in controversy, in no small part because of his support of the far-right German Alternative for Germany (AfD), a party with ties to neo-Nazism. Musk conducted a lengthy interview with party leader Alice Weidel, even seemingly agreeing with her false statement that Adolf Hitler was a communist.

Unfortunately for Tesla, it seems some Dutch customers have had enough. According to Fortune, a survey by EenVandaag found that 31% of Dutch customers have either sold their vehicle or are considering it.

“There’s been a debate in the Netherlands around Tesla shame,” pollster Joyce Boverhuis told Fortune. “But it’s one thing just to be embarrassed by Musk. It’s another thing entirely when you take the next step and think about actually selling it.”

As Fortune points out, the survey was conducted before Musk’s salute at Donald Trump’s inauguration, an incident that will likely push even more Tesla owners to consider selling. During the inauguration, Musk twice made a gesture that looked nearly identical to a Nazi salute. Some have tried to explain it as Musk using the gesture to say “my heart goes out” to the audience, but the tech exec has used a far more benign gesture when making such a statement to past audiences.

Interestingly, as the outlet notes, EVs enjoy far wider adoption in the Netherlands than in the US. A significant percentage of Dutch support President Trump.

“We’re following the U.S. in terms of politics and cultural behavior,” Boverhuis added. “To give you an idea of how the Dutch feel about Trump, 23% of 26,000 people we surveyed last week replied by saying they would like to live in a country where he is president.”

As a result, Musk supporters cannot claim that the Dutch are reacting they way they are because of a dislike of Trump, his politics, or Musk’s support of the administration. Instead, it would appear to be a dislike for Musk alone that is causing the issue.

Musk Is a Growing Problem for Tesla

This is not the first time Musk has been accused of dragging Tesla down. Market intelligence firm Caliber found that Tesla’s brand consideration score dropped dramatically over the last few years—from 70% in 2021 to 31% in 2024—likely because of Musk.

“It’s very likely that Musk himself is contributing to the reputational downfall,” said Caliber CEO Shahar Silbershatz.

Ultimately, no one knows whether Musk meant his salute as a Nazi salute, a Roman salute (which the Nazi salute drew inspiration from), or if he meant it as “my heart goes” to the audience gesture. Given that he has used a much different gesture for the latter scenario, it seems unlikely that was his intention.

Ultimately, however, it may be a distinction without a difference. Either Musk willfully made a Nazi salute, or he made a gesture that was so similar that he still should have known better. It’s also not outside the realm of possibility that he made the gesture purely to rile critics, counting on his wealth and position within the administration to shield him from any real consequences.

In the aftermath of the incident, Musk has not denied that it was a Nazi salute, instead mocking critics who took offense at it.

Whatever Musk’s intentions, Tesla owners may finally be growing tired of his child-like antics.



from WebProNews https://ift.tt/KShm5lT

Friday, 31 January 2025

DOJ Files Suit to Block HPE’s Purchase of Juniper Networks

The Department of Justice has filed a lawsuit to block Hewlett Packard Enterprise from purchasing smaller rival Juniper Networks.

HPE announced in January 2024 that it had reached an agreement to purchase Juniper Networks in an all-cash transaction worth roughly $14 billion. Juniper specializes in AI-native networks, making it an appealing takeover target for HPE, as HPE made clear at the time of the announcement:

Through its suite of cloud-delivered networking solutions, software, and services including the Mist AI and Cloud platform, Juniper helps organizations securely and efficiently access the mission-critical cloud infrastructure that serves as the foundation of digital and AI strategies. The combination with HPE Aruba Networking and purposely designed HPE AI interconnect fabric will bring together enterprise reach, and cloud-native and AI-native management and control, to create a premier industry player that will accelerate innovation to deliver further modernized networking optimized for hybrid cloud and AI.

Unfortunately for the two companies, the DOJ has filed a suit to block the acquisition, saying it will reduce competition in the network hardware space.

The United States of America brings this civil action to prevent Hewlett Packard Enterprise Company (“HPE”) from acquiring a smaller, but innovative rival, Juniper Networks, Inc. (“Juniper”). HPE and Juniper are the second- and third-largest providers of commercial or “enterprise” wireless networking solutions, respectively, in the United States. The acquisition, if consummated, would result in two companies—market leader Cisco Systems, Inc. (“Cisco”) and HPE—controlling well over 70 percent of the U.S. market and eliminate fierce head-to-head competition between Defendants, who offer wireless networking solutions under the HPE Aruba and Juniper Mist brands.

The DOJ goes on to say that Juniper forced HPE to discount its prices, and that HPE only wants to purchase the small company because it cannot compete on merit.

For years, pressure from Juniper has forced HPE to discount deeply and invest in developing advanced software products and features as part of a multifaceted campaign to “Beat Mist. The “Beat Mist” campaign failed. Having failed to beat Juniper’s Mist on the merits, HPE seeks to acquire Juniper instead for $14 billion. This proposed acquisition risks substantially lessening competition in a critically important technology market and thus poses the precise threat that the Clayton Act was enacted to prevent. It should be blocked.

A Presumptively Unlawful Merger

The suit goes on to make the case that the merger is “presumptively unlawful,” since it would reduce competition and increase consolidation within the market.

The proposed merger is presumptively unlawful. It would significantly increase concentration in an already consolidated relevant market for enterprise-grade WLAN solutions. The proposed acquisition would result in two firms controlling over 70 percent of the relevant market.

To measure market concentration, courts often use the Herfindahl-Hirschman Index (“HHI”) as described in Section 2.1 of the 2023 Merger Guidelines. See United States Department of Justice and Federal Trade Commission, Merger Guidelines (2023 ed.) § 2.1. HHIs range from 0 in markets with no concentration to 10,000 in markets where one firm has 100 percent market share. Under the Merger Guidelines, a market with HHI greater than 1,800 is highly concentrated, and a change of more than 100 points is a significant increase. See Fed. Trade Comm’n v. Kroger Co., No. 3:24-cv- 00347, 2024 WL 5053016, at 15 (D. Or. Dec. 10, 2024). A merger that creates or further consolidates a highly concentrated market that involves an increase in the HHI of more than 100 points is presumed to substantially lessen competition and is presumptively unlawful. See id. at 15 (citing U.S. Dep’t of Justice & Fed. Trade Commission, Merger Guidelines § 2.1 (2023)).

The proposed merger between HPE and Juniper easily clears these hurdles in the markets for enterprise-grade WLAN solutions and is presumptively unlawful, with a pre-merger HHI over 3,000 and a change of at least 250 points using IDC’s estimates of U.S. market shares for wireless access points. Cisco and Defendants’ shares of the U.S. enterprise-grade WLAN market are roughly in line with their shares of the U.S. market for access points alone.

A Merger Would Hurt the Market

The DOJ maintains that a merger between the two companies would hurt the market in a way that could not be easily offset. This is due to the high barrier to entry any company looking to enter the market would face.

Entry by new vendors of enterprise-grade WLAN in response to the merger would not be timely, likely, or sufficient to offset the anticompetitive effects of the proposed merger of HPE and Juniper. It takes years and significant financial investment for a vendor to design and procure hardware components for a WLAN portfolio; create a management platform that incorporates tools that streamline and automate network maintenance; build a sales and support organization; and recruit value-added resellers and other distribution partners that procure and install equipment for WLAN customers.

The DOJ also believes that any proposed “synergies” of the merger are doubtful to live up to the hype.

Defendants have claimed that the proposed acquisition would generate synergies by combining operations and removing duplication in the companies’ sales, administrative, and other organizations. But HPE’s own executives—and several of HPE’s competitors—have expressed doubts about HPE’s ability to successfully integrate Juniper’s products into its networking portfolio. Regardless, to the extent the proposed transaction would result in any verifiable, merger-specific efficiencies in the relevant market, such efficiencies are unlikely to be timely or substantial enough to mitigate the risk to competition posed by the transaction.

Conclusion

The Trump administration has promised to crack down on Big Tech, vocally criticizing the influence tech companies have. Reuters reports that HPE representatives met with the Trump administration, but clearly those meetings were not productive enough to prevent the lawsuit.

The DOJ’s legal action could portend what’s to come for Big Tech companies and their future merger attempts.



from WebProNews https://ift.tt/q2y1Q8D

SoftBank May Invest $25 Billion In OpenAI

SoftBank is the latest company interested in making a massive investment in OpenAI, with the company reportedly looking to invest as much as $25 billion.

OpenAI has been wooing investors as it continues to spend money at an extraordinary rate in its quest for true artificial intelligence. Microsoft has been one of the company’s largest investors, but the relationship between the two companies appears to be cooling.

According to Financial Times, via TechCrunch, SoftBank could invest between $15 and $25 billion dollars in the AI firm. The investment would be in addition to the $15 billion it plans to invest in the US Stargate AI project.

As the outlets point out, the investment would be SoftBank’s largest since its failed WeWork bet. What’s more, the investment would also serve to give OpenAI more independence from Microsoft.



from WebProNews https://ift.tt/uPXahep

AI-Powered DevSecOps: Forecasting the Future of Software Security in 2025

In the rapidly evolving tech landscape of 2025, artificial intelligence (AI) is not just enhancing software development—it’s revolutionizing security practices within DevSecOps, the integration of development, security, and operations. Here’s a detailed look at the transformative predictions shaping this sector:

AI-Driven Vulnerability Management

2025 marks a significant leap in how vulnerabilities are managed, with AI playing a pivotal role. Beyond merely detecting security flaws, AI systems now offer remediation strategies, learning from vast datasets to suggest fixes tailored to specific software environments.

“AI-powered DevSecOps is fundamentally changing the landscape of software development and cybersecurity,” notes Ayal Cohen of OpenText in a recent post on X.

The Evolution to ‘Shift Everywhere’

What was once known as the “shift-left” approach in security—where security is addressed early in the development cycle—has evolved. We’re witnessing a “shift everywhere” paradigm, where AI ensures security is omnipresent, from code conception to post-deployment monitoring.

This development means developers can work directly with real-time security insights in their integrated development environments (IDEs), while CI/CD pipelines use AI for continuous security checks.

The Dual Role of AI in Cybersecurity

AI’s role in 2025 is as much about defense as the potential for offense. While AI enhances threat detection and incident response, it also enables attackers to craft more sophisticated threats.

“AI’s potential in cybersecurity is a double-edged sword, empowering both defenders and attackers,” shares Ayal Cohen in another X post. This necessitates a nuanced approach to AI implementation in security protocols.

API Security: A New Frontier

With the rise of microservices and cloud-native applications, APIs have become critical, and securing them is paramount. AI is at the forefront here, predicting and thwarting threats by understanding and monitoring API behavior patterns.

“API security is moving from a technical concern to a boardroom imperative,” according to a post by vmblog on X, with AI being pivotal in managing the security of these interfaces.

The Rise of Integrated Development Platforms

The siloed toolsets of the past are giving way to AI-enhanced, integrated platforms. These platforms not only streamline development but also bake security into every step, reducing the cognitive load on developers and enhancing productivity.

Addressing Security Debt with AI

As AI accelerates development, it also risks increasing security debt. However, AI is also the proposed antidote, capable of scaling remediation efforts to match the speed of development, ensuring vulnerabilities are identified and addressed swiftly.

As we stand in 2025, integrating AI into DevSecOps is proving to be a game-changer for software security. The industry is at a crossroads where the benefits of AI must be balanced with the potential risks it introduces.

The tech sector’s challenge is clear: harness AI to make software development faster and fundamentally more secure. This year might well be remembered as the moment AI truly began to reshape the security landscape, for better or worse, in software development.



from WebProNews https://ift.tt/mLp5TqJ

Alternative Investments: Types, Benefits and Challenges, and How to Approach Them

Investing is an exciting endeavor for many people, as it helps grow your wealth, allowing you to meet your financial goals and enhancing your purchasing power. However, given the numerous options available, choosing the right fit for your portfolio can also be intimidating.  While many investors opt for asset classes like bonds, stocks, and cash, others willing to embrace innovation look at alternative investment options that allow them to capitalize on wealth-building opportunities, ranging from venture capital and private equity to art and real estate. 

Cryptocurrency is also one of the newest alternative investments, allowing investors to take advantage of the ethereum price chart and see substantial returns. In general, high-net-worth individuals are the ones to hold alternative investment assets due to these assets’ lack of regulation, complex nature, and high-risk level, and they are fairly illiquid as opposed to their conventional counterparts. Below, we will explore alternative investments in detail, discussing the different types available and their pros and cons, and provide a few tips on approaching these investments. Read on!

What are the different types of alternative investments? 

Alternative investments provide unique rewards and risks, so it’s essential to understand them and see how they fit your needs and your risk level. You can choose among the following:

  • Cryptocurrency is digital currency powered by the blockchain, which records each transaction as a block of data and forms a chain to illustrate a clear ownership timeline. When choosing a crypto to invest in, it’s necessary to conduct research, as there are thousands of options available, and some of them are most profitable, such as Bitcoin and Ethereum. While cryptocurrencies have downsides and are volatile, they offer strong wealth potential.
  • Real estate. When looking to invest in real estate, the option is to go for investment properties, which consist of office buildings, residential apartment buildings, or mixed-use buildings. Real estate is suitable for investors seeking to gain value from properties alongside the increase in rental rates, which offer valuation to the properties. However, becoming a landlord and managing this investment alternative requires work. 
  • Hedge funds. Hedge funds are among the most desirable options for investors, and they are categorized by different strategies, such as event drive, relative value, macro, equity hedge and more. Such strategies represent actively managed bets seeking to beat the average returns in clients’ favor.  
  • Commodities. These assets don’t have a similar market behavior to stocks and bonds in terms of fluctuations, and they can involve agriculture like corn, metals like gold, and energy like crude oil, to name a few. They can represent an inflation hedge, coming to maturity at various times of the year, and they can also be sold in future markets. 
  • Private equity. Compared to publicly traded shares in enterprises, private equity investments focus on non-publicly traded companies. Capital is invested in these companies, which can be used for different purposes, like making an acquisition, bolstering a balance sheet, expanding on current capital, or buying new technology.  
  • Art and collectibles. Some investments can double as hobbies, such as entertainment memorabilia, art, high-end watches, and other collectibles, which have historical depth or can gain value over time as related parties ( like the associated athlete or the artist) become more historic. 

What are the pros and cons of alternative investments? 

Alternative investments have low correlations with conventional ones, like bonds or stocks, due to their unique nature, and as a result, they represent a massive opportunity for investors who want to diversify their portfolios. Given that alternatives are riskier investments, they offer a higher potential return than traditional investments. Furthermore, they have different structures and forms and enable investors to select the option that’s best suited for them based on their risk appetite, preferences, and investment goals. Alternative investments give you the opportunity to tap into markets that cannot be accessed through traditional investments, which is genuinely appealing to many investors ( for example, a baseball enthusiast may be more excited to buy an autographed baseball). Selling a collectible can be more challenging because the market is less liquid, and thus, there are fewer buyers. However, this can be viewed as a benefit because it boosts price stability and lowers the likelihood of panic selling. 

However, alternative investments present downsides. First and foremost, they have higher fees due to their limited accessibility, which can reduce investors’ returns. Furthermore, it can be challenging to acquire market data on their pricing or historical trends because they are not commonly publicly traded. While public companies comply with reporting rules, some types of alternative investments come with increased fraud risk, as they aren’t subjected as much to regulatory oversight. Since they are also more complex than traditional investments, they can be challenging for some investors to understand, leading to uninformed or inappropriate decisions. 

What are the best practices when diving into alternative investments? 

If you’re considering getting started with alternative investments, we recommend taking the following steps to make the most of your journey:

  • Understand alternative investment classes. Since these types of investments have differences in market expectations, structure, and regulations, investors should research each one by taking advantage of resources like courses, webinars, and similar educational opportunities. Doing so will offer them insight into how the asset class functions and allow them to decide how each one aligns with their goals. 
  • Find a trusted provider. When looking for a trusted provider, you should focus on aspects like fit, integrity, and value. Above all else, your provider should have your best interest in mind, and make you aware of all the risks involved when it comes to an unstable investment option. Furthermore, they shouldn’t overlook the exorbitant fees that could hinder your wealth accumulation. It’s essential to ensure the provider is trustworthy and transparent and that they have investment selections of excellent quality, so don’t overlook this aspect. 
  • Track the performance of the investments. Finally, it’s highly recommended that a benchmark be created to track the performance of the selected funds. However, if you’re a beginner, this could feel like wading in a pool of confusing numbers and figures, so use educational resources before you feel comfortable with assessing the performance of your investments – there are many webinars and published reference materials you can take advantage of, and even 1:1 expert instruction. Once you understand how the investments operate, you can interpret the data and gain clarity on how the fund is stacking up to the rest with similar strategies. 

The bottom line

 Alternative investments have excellent benefits, but they also pose challenges that you must understand before you get started with a specific asset class. Take the time to do your research and opt for alternative investments only if you believe they are a good fit for you and you can tolerate the high risk levels they involve.  



from WebProNews https://ift.tt/gVamODu

Thursday, 30 January 2025

AI Supercharges Developer Productivity: Transforming Code Creation to System Maintenance

Artificial Intelligence (AI) has become the catalyst for a productivity renaissance in the high-velocity world of software development, where demand outstrips supply. For professional developers, AI isn’t just another tool; it’s a transformative force that reshapes the entire software lifecycle. Here’s how AI revolutionizes development for those at the forefront of code creation, testing, maintenance, and beyond.

Code Creation: Beyond Autocomplete

AI has transcended simple code suggestions to become an integral part of the coding process. Tools like GitHub Copilot or DeepMind’s AlphaCode now offer intelligent code completion beyond syntax, proposing entire functions or algorithms based on context, project history, and global codebases.

What was once a solitary task has evolved into pair programming with AI, where the machine suggests alternative implementations, highlights potential improvements, or alerts to security vulnerabilities in real time. This shift allows developers to bypass boilerplate code, focusing instead on high-level logic and innovative architecture.

Testing: Comprehensive and Predictive

In the realm of testing, AI has introduced a predictive element. It generates test cases, including those that human testers might not conceive, by learning from vast datasets of code, bugs, and fixes. This results in enhanced test coverage with less manual effort. AI also optimizes CI/CD pipelines by predicting which tests are most likely to fail, prioritizing them, or suggesting which tests can be safely removed, accelerating deployment cycles and improving release reliability.

Maintenance and Monitoring: From Reactive to Predictive

The maintenance phase has significantly shifted from reactive to predictive thanks to AI. Systems now monitor applications in production, detecting anomalies in performance, security, or user behavior. AI can predict potential issues before they escalate, alerting developers in time to take preventative actions. Moreover, when vulnerabilities or bugs surface, AI can suggest patches based on historical data, dramatically speeding up the resolution process. The pinnacle of this trend is self-healing systems where AI autonomously implements fixes, reducing downtime and the urgency for human intervention.

Documentation and Knowledge Management

AI also plays a crucial role in documentation, automatically updating or generating documentation as code changes, ensuring that technical documentation remains both current and comprehensive. Beyond documentation, AI enhances knowledge management by analyzing code, commit messages, and issues to build a dynamic knowledge base, which can answer developer queries about project history or architectural decisions.

Challenges and Considerations

While AI’s integration into development is largely beneficial, it presents some challenges. Developers must adapt to this new paradigm, learning to critically interpret AI’s suggestions while maintaining their creativity and problem-solving skills. There’s a delicate balance to strike to avoid over-reliance on AI, which could potentially stifle innovation or introduce biases if not managed with ethical considerations in mind.

AI is Not Replacing Developers

AI is not replacing developers but augmenting their capabilities, making them more efficient, creative, and focused on delivering value through complex problem-solving. The future of development is a symbiotic relationship between AI and human developers, where each enhances the other’s strengths. For the professional developer, mastering this integration is not just about keeping up; it’s about leading in an industry that’s increasingly intertwined with artificial intelligence.



from WebProNews https://ift.tt/jZ4VOH0

DevOps 2025: AI Integration, Enhanced Security, and the Convergence of MLOps

The year 2025 marks a pivotal point where traditional methodologies are not just enhanced but redefined by the integration of Artificial Intelligence (AI), a strategic focus on security through DevSecOps, and the convergence with Machine Learning Operations (MLOps). This article explores these intertwined trends, their implications for the industry, and the roadmap ahead.

AI Integration in DevOps: The New Frontier

The integration of AI into DevOps, often termed AI/CD (AI-driven Continuous Deployment), represents a paradigm shift. AI’s role in DevOps transcends automation; it’s about prediction, optimization, and self-healing systems.

  • Predictive Analysis: AI algorithms now forecast potential failures or performance bottlenecks before they impact production. Tools like machine learning models analyze historical data from deployments, tests, and logs to predict outcomes with high accuracy.
  • Optimization of Processes: AI-driven optimization goes beyond simple automation. It involves dynamically adjusting resources, optimizing code deployment strategies, or even suggesting architectural changes based on real-time performance data.
  • Self-Healing Systems: Perhaps the most revolutionary aspect is the development of systems that can autonomously diagnose and fix issues. This reduces downtime, enhances reliability, and shifts human effort from reactive maintenance to proactive innovation.

Enhanced Security: The DevSecOps Evolution

Security in DevOps has evolved from an afterthought to a foundational element, leading to the concept of DevSecOps. In 2025, this evolution is characterized by:

  • Security Automation: Security checks are now integrated into every step of the CI/CD pipeline. From code scanning for vulnerabilities to automated compliance checks, security is built into the product from the ground up.
  • Zero Trust Architecture: With the rise of remote work and cloud services, the zero trust model has become central. Every access, whether from within or outside the network, is authenticated, authorized, and continuously validated.
  • AI in Security: Machine learning models assist in anomaly detection, predicting potential security breaches, and even suggesting remediation strategies. This symbiosis of AI with security practices ensures a more resilient application ecosystem.

The Convergence of DevOps and MLOps

The integration of DevOps with MLOps signifies a fundamental shift towards what we can call “AIOps” – AI Operations. Here’s how they converge:

  • Unified Pipelines: Previously separate pipelines for software and model deployment are now converging. This means a single pipeline can handle the deployment of both code and models, ensuring consistency, version control, and traceability.
  • DataOps Integration: The management of data, crucial for both DevOps and MLOps, has led to the rise of DataOps. This ensures data quality, availability, and compliance, facilitating both software and model development.
  • Shared Tools and Practices: Tools like Kubernetes, Docker, and Git have become staples not just for software but also for machine learning models. Practices like blue-green deployments or canary releases are now applied to models, ensuring safe updates and rollbacks.

Challenges and Considerations

While these trends promise a more efficient, secure, and innovative future, they come with challenges:

  • Complexity Management: The integration of various domains increases system complexity, necessitating advanced skills in orchestration and management.
  • Ethical and Privacy Concerns: AI models, particularly in security and predictive analytics, must be developed with ethical considerations in mind, respecting privacy and avoiding bias.
  • Cultural Shift: The convergence requires a cultural shift towards embracing continuous learning, not just for technology but for the methodologies of how teams work together.

All-Encompassing Approach

By 2025, DevOps has transcended its original scope to become an all-encompassing approach where AI, security, and machine learning operations blend seamlessly. This evolution is not just about adopting new tools or technologies but about fostering a new culture of development that is anticipatory, secure, and inherently intelligent.

As we move forward, the key to success will be in how well organizations can adapt to this multifaceted, dynamic environment, ensuring they leverage these trends to drive innovation while managing the inherent challenges effectively.



from WebProNews https://ift.tt/LiJvb7O

Wednesday, 29 January 2025

Perplexity AI Integrates DeepSeek, Giving Users Uncensored Private Option

Perplexity AI CEO Aravind Srinivas announced the company has integrated DeepSeek AI into its service, giving users a way to use the AI model privately and without censorship.

DeepSeek has dominated the news after it surprised the industry by revealing an AI model that rivals OpenAI, one it developed at a fraction of the cost and using second-rate Nvidia chips. Unfortunately, as a Chinese company, using DeepSeek’s R1 model comes with two main concerns:

  • As with any Chinese company, there is a major concern regarding data and privacy, with Chinese companies legally bound to cooperate with Beijing in their surveillance and espionage efforts.
  • DeepSeek R1 has already been shown to be aggressively censoring content, especially anything potentially critical of China. To see this at work, simply ask the the AI model to describe what happened at Tiananmen Square.

Perplexity is giving users an option, however, adding DeepSeek R1 to the list of AI models it offers support for. Srinivas announced the development in a post on X.

We’ve shipped many things in Perplexity, but integrating DeepSeek R1 with search is truly a phenomenal experience, seeing the model think out loud like an intelligent person, reading hundreds of sources, with sleek UX. Yes, the limits suck right now, but as I promised, we will increase them every day.

Because R1 can be used and deployed by anyone, with the source code available, Perplexity is able to address both concerns about R1 by running it on US-based servers and removing any censorship.

Srinivas’ announcement is good news for users who want to try out DeepSeek’s models, but want to do so without compromising their privacy or being fed censored results.



from WebProNews https://ift.tt/q7ae3Zr

Italy Investigates DeepSeek Over Privacy Concerns

The Italian government is joining the growing list of entities concerned about Chinese AI startup DeepSeek, launching an investigation over privacy issues.

DeepSeek has quickly gained recognition for its impressive AI model, one that rivals the best OpenAI has to offer. Even more impressive is the fact that DeepSeek built its model for a mere $3-$5 million, a fraction of the $100 million it cost OpenAI, while doing it with second-rate Nvidia hardware.

The Italian data and privacy watchdog, the Garante Per La Protezione Dei Dati Personali (GPDP), announced it was launching an investigation of DeepSeek over “possible risk for data from millions of people in Italy.”

The GPDP made the announcement on its official website (machine translated):

The Guarantor for the protection of personal data has sent a request for information to Hangzhou DeepSeek Artificial Intelligence and to Beijing DeepSeek Artificial Intelligence, the companies that provide the DeepSeek chatbot service, both on the web platform and on the App.

Given the possible high risk for the data of millions of people in Italy, the Authority asked the two companies and their affiliates to confirm what personal data are collected, from which sources, for what purposes, what the basis is legal treatment, and whether they are stored on servers located in China.

The Guarantor also asked the companies what type of information is used to train the artificial intelligence system and, in the event that personal data is collected through web scraping activities, to clarify how users registered and those not registered in the service have been or are informed about the processing of their data.

Given that DeepSeek is a Chinese AI firm, it’s a safe bet this is not the last investigation it will face.



from WebProNews https://ift.tt/EaLg5Pd

Pat Gelsinger Is Switching His Startup From OpenAI to DeepSeek

DeepSeek just got a major endorsement, with former CEO Pat Gelsinger saying he is switching his startup from using OpenAI to DeepSeek.

DeepSeek took the tech and AI industry by surprise, unveiling an AI model that matches the best from OpenAI, but at a fraction of the cost—as little as $3-$5 million. Even more impressive, the Chinese startup used Nvidia H800, chips specifically designed to comply with US export laws. As a result, the H800 offers less performance than Nvidia’s flagship chips.

The Chinese startup’s success has raised numerous questions regarding the AI industry, not the least of which is whether American companies are overvalued and if the AI bubble is about to burst. There are also questions about the effectiveness of US sanctions on Chinese firms, given that DeepSeek achieved its success using second-rate chips.

Beyond technological and political questions, DeepSeek is already gaining a myriad of fans and users, including Gelsinger. The longtime tech exec took to X to emphasize the transformational impact of DeepSeek’s achievement.

Wisdom is learning the lessons we thought we already knew. DeepSeek reminds us of three important learnings from computing history:

  1. Computing obeys the gas law. Making it dramatically cheaper will expand the market for it. The markets are getting it wrong, this will make AI much more broadly deployed.
  2. Engineering is about constraints. The Chinese engineers had limited resources, and they had to find creative solutions.
  3. Open Wins. DeepSeek will help reset the increasingly closed world of foundational AI model work. Thank you DeepSeek team.

Even more telling, Gelsinger told TechCrunch that his startup, Gloo, was adopting DeepSeek’s R1 model instead of paying for OpenAI’s o1.

“My Gloo engineers are running R1 today,” he said. “They could’ve run o1 — well, they can only access o1, through the APIs.”

Gelsinger went on to say that he believes DeepSeek will help usher in more affordable AI that can be deployed and integrated in far more devices.

“I want better AI in my Oura Ring. I want better AI in my hearing aid. I want more AI in my phone. I want better AI in my embedded devices, like the voice recognition in my EV,” he says.

If Gelsinger’s reaction is any indication, DeepSeek’s impact on the AI and tech industry could be far greater than critics believe—and that’s saying something.



from WebProNews https://ift.tt/d6PMWNS

Smartphone Security: Protecting Business Data in the Age of BYOD

The trend of Bring Your Own Device (BYOD) has become a standard for many businesses, allowing employees to use their own devices for work. According to the data, 82% of companies have a BYOD program. 

While this approach provides much-needed flexibility, cost savings, and productivity enhancement, it comes with significant cybersecurity risks. While it’s not a bad policy to adopt, businesses that embrace a BYOD model need to implement tight security measures to safeguard their important data.

First things first – develop a comprehensive BYOD policy

It’s not good enough to simply tell new hires they can use a personal device if they prefer. It’s crucial to have a comprehensive BYOD policy that specifically addresses elements like security protocols, employee responsibilities, and consequences for ignoring the rules. 

Here are some tips for creating your BYOD policy:

·  Define which devices may be used for work. For example, you might allow tablets (but not smartphones), or laptops (but not tablets). Whatever devices you allow, require them to remain in a protective case at all times. Good cases are affordable, even for new phones like the S25.

·  Specify how each device is to be secured. At the very least, require antivirus software to be installed on every device. You can also require that devices use a password and biometric lock to prevent unauthorized access. Some companies require software that monitors activity or allows for wiping data remotely. You can also create a rule that prohibits employees from allowing other people to use their devices at any time, including friends and family.

·  Create a policy that complies with regulations. Depending on your industry, it might be too much of a security risk to allow anyone to use a personal device, but if not, implement rules that adhere to applicable regulations.

·  Establish a procedure for wiping data remotely. Have a plan for wiping data remotely if a device is lost or stolen, or if an employee leaves the company.

·  Have welldefined consequences. Nobody wants to be the bad guy, but you can’t afford to ignore non-compliance. Spell out the consequences for disregarding your BYOD policies and enforce them across the board without exception. If you make just one exception, people will let their guard down, knowing they can talk their way out of a write-up or termination.

·  Conduct regular security audits. Verify that rules are being followed by conducting regular audits.

·  Block app installations. Implement software that won’t allow unauthorized apps to be installed. This may force some employees to opt out, but it’s safer for your company.

Implement a device management solution

Don’t hesitate to use software that monitors, manages, and secures your employees’ BYOD devices. It’s the only way to maintain control over your data and accounts. Employees may not like the idea of having their personal devices monitored or controlled, but personal devices come with big risks. 

If they want the convenience of being able to use their personal smartphone or laptop, they need to agree to your rules. Otherwise, they’ll need to buy a dedicated personal device or use a company-issued device.

Require encryption for data and traffic

Encrypt all data on the device’s hard drive. It’s good practice to prohibit the use of public Wi-Fi networks, but if you can’t get around that, require employees to use a VPN.

Don’t allow company-issued devices to become personal devices

In addition to securing personal devices, you also need to prevent company-issued devices from turning into personal devices. The easiest way to prevent this is to prohibit taking work devices home.

Train employees on security best practices

Cybersecurity training is crucial, but it only works when it’s thorough and ongoing. Start conducting regular training sessions to educate employees about potential threats specifically related to BYOD. For example, you’ll need to get them thinking about phishing schemes, advanced social engineering techniques, and the importance of installing antivirus updates as soon as they’re available.

Back up data regularly

You can’t rely on employees to back up their data on a regular basis. Even if it’s written into your company policy, backups are often too tedious for the average employee to manage. Instead, implement solutions that create automatic backups wherever they work. 

For example, anything employees do in the cloud – like adding, editing, or deleting documents – should create an automatic record and backup. A great example is how Box maintains access to older versions of documents.

It’s about awareness, training, and strict policies

Once you have a strict BYOD cybersecurity policy, foster a culture of security awareness where employees understand their role in preventing cybersecurity incidents. Your employees will be more likely to follow the rules, and the risk to your business will decrease.



from WebProNews https://ift.tt/bPTln7V

Tuesday, 28 January 2025

Trump Threatens 100% Tariffs On TSMC

President Trump is continuing to threaten Tariffs, this time targeting TSMC via Tariffs on chips made in Taiwan.

TSMC is the world’s leading semiconductor manufacturer. The company makes chips for all of Apple’s products, as well for AMD, Nvidia, Intel, and more. The company has a significant technological lead over rivals, making it the go-to option for companies needing the most advanced chips on the market.

“In the very near future, we’re going to be placing tariffs on foreign production of computer chips, semiconductors and pharmaceuticals to return production of these essential goods to the United States,” Trump said in a speech to House Republicans at the Trump National Doral Gulf Club in Miami.

“They left us and went to Taiwan, which is about 98% of the chip business, by the way, and we want them to come back,” Trump said, speaking of companies like Apple and Nvidia, which rely on TSMC for chip production.

Trump went on to say that companies would build factories in the US without receiving billions in AID, referencing the US CHIPS Act.

“And we don’t want to give them billions of dollars like this ridiculous program that Biden has given everybody billions of dollars. They already have billions of dollars,” Trump continued. “They’ve got nothing but money Joe. They didn’t need money. They needed an incentive. And the incentive is gonna be they’re not gonna wanna pay a 25, 50 or even a 100 % tax.”

“They’re gonna build their factory with their own money,” Trump added. “We don’t have to give them money. They’re going to come in because it’s good for them to come in. They’re giving the money, they don’t even know what they’re going to do with it.”

The Bigger Issue

While tariffs could certainly play a roll in forcing TSMC and other chip manufacturers to open more plants in the US, or even push companies to use Intel’s foundries instead of TSMC, leveling tariffs against Taiwanese chipmakers ignores a larger issue.

Detroit is not the automotive capital of the world just because Ford, GM, and Chrysler’s manufacturing facilities are there. The truth of the matter is that there is an entire industry built up around the companies, providing the myriad of support and supplementary services and products needed to manufacture automobiles.

The same is true with the computer industry. The actual semiconductors are just one part of the picture. The reality is that there is an entire industry built up in China, India, and Vietnam supporting the manufacture of computers, smartphones, tablets, and more.

While forcing companies to build more US-based semiconductor factories is certainly a step toward revitalizing American semiconductor production, it will not by itself result Apple, HP, Dell, or any other electronics company suddenly making their products in the US. The US simply doesn’t have the infrastructure in place to support domestic computer, smartphone, and tablet production.

As a result, it remains unclear what the ultimate end-goal is: A revitalization of US semiconductor production, and semiconductor production alone, or the first step toward a complete rebuilding of the entire infrastructure needed for domestic computer production.



from WebProNews https://ift.tt/IgWcDKB