Google's Veo 2 video generator takes on Sora Turbo – how to try it

Google's Veo 2 video generator takes on Sora Turbo – how to try it

Screenshot by Sabrina Ortiz/ZDNET OpenAI upped the ante in the video generation space earlier this month, making Sora — its state-of-the-art text-to-video generator model — available to ChatGPT Plus users with Sora Turbo. Now, Google is gearing up to compete with the launch of its most advanced video generator.  On Monday, Google launched Veo 2, a text-to-video generator that boasts improvements from the company’s previous model, including a better understanding of real-world physics, which helps the AI…

Read More

Why Google's quantum breakthrough is 'truly remarkable' – and what happens next

Why Google's quantum breakthrough is 'truly remarkable' – and what happens next

Google’s Willow quantum computing chip has 105 physical qubits crafted from superconducting “transmons,” a technique pioneered in 2007 at Yale University. Google Google’s quantum computing scientists this month demonstrated breakthroughs in the field that reinforce the sense that quantum computing is for real and will be able to find its place among other kinds of computers as a valuable resource.  But much remains to be done: Google’s latest quantum chip — called Willow and fabricated…

Read More

I built the ultimate home theater setup with these 3 products – here's my buying advice

I built the ultimate home theater setup with these 3 products – here's my buying advice

ZDNET’s key takeaways The LTV-3500 Pro projector is available now from the official AWOL site for $6,000. The LTV-3500 Pro projector creates some of the clearest images of any projector I’ve used, and the screen is remarkable, even with too much ambient light. The AWOL package is far too expensive for most family budgets. Let’s face it: I dig video and audio. Any chance I can try a new piece of technology, I’ll jump at…

Read More

CrowdStrike Survey Highlights Security Challenges in AI Adoption

CrowdStrike Survey Highlights Security Challenges in AI Adoption

Do the security benefits of generative AI outweigh the harms? Just 39% of security professionals say the rewards outweigh the risks, according to a new report by CrowdStrike. In 2024, CrowdStrike surveyed 1,022 security researchers and practitioners from the U.S., APAC, EMEA, and other regions. The findings revealed that cyber professionals are deeply concerned by the challenges associated with AI. While 64% of respondents have either purchased generative AI tools for work or are researching…

Read More

The Netflix feature that lets you share your favorite scenes comes to Android

The Netflix feature that lets you share your favorite scenes comes to Android

Netflix Several months ago, Netflix made it easier to watch your favorite moments again and again and share them with friends. With the new “Moments” feature, you can quickly bookmark a scene while watching on your phone. At first, this was only available on iOS, but now it’s available on Android too.  Here’s how it works: tap “Moments” in the bottom left corner when you’re watching on the mobile app, and the scene will save directly…

Read More

If your Windows 10 PC can't be upgraded, you have 5 options before time runs out

If your Windows 10 PC can't be upgraded, you have 5 options before time runs out

DKosig/Getty Images Have you decided what to do with your Windows 10 PCs when they reach their official end-of-support date less than a year from now? I know some people who are convinced that Microsoft will back down at the last minute and extend that deadline. Take this prediction to the bank: That’s not gonna happen.  Also: The 3 most Windows-like Linux distros you can try because change is hard The end date is right there on…

Read More

On Arm PC return rates and CEO posturing

On Arm PC return rates and CEO posturing

With her claim that retailers are seeing high returns of Arm PCs, Intel interim CEO Michelle Johnston Holthaus appears to be trying to scare buyers off the rival processor architecture. But enterprise buyers who look before they leap have little to fear. Speaking at Barclay’s annual technology conference late last week, Holthaus said “if you look at the return rate for Arm PCs, you go talk to any retailer, their number one concern is, ‘I…

Read More

Cisco grabs SnapAttack for threat detection

Cisco grabs SnapAttack for threat detection

Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to expand its security portfolio. Established in 2001 by Booz Allen’s Dark Labs, SnapAttack is known for its threat detection and engineering technology, which melds threat intelligence, attack emulation, and behavioral analytics to help customers identify potential vulnerabilities and gaps in their networks, ideally before problems happen.  “SnapAttack provides a solution that supports the complete detection content lifecycle, starting with curated detection…

Read More

Amazon's new Nova AI models could be ground-breaking – why we can't know for certain

Amazon's new Nova AI models could be ground-breaking – why we can't know for certain

A video generated by Amazon’s new frontier model, Reel, using the phrase, “A snowman in a Venetian gondola ride, 4k, high resolution.” Amazon AWS Most reports on AWS’ re:Invent conference earlier this month, which brought us new chips and new data centers, overlooked the cloud giant’s unveiling of its first “frontier” models in generative artificial intelligence, code that can compete with the best from OpenAI and Google. Amazon debuted Nova, a “new generation of state-of-the-art foundation models that deliver frontier intelligence…

Read More

Innovator Spotlight: Fortra

Innovator Spotlight: Fortra

by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure to simplify their security stacks and improve operational efficiency. According to Security Magazine, 78% of organizations are using over 50 security tools, creating complexity and noise, which makes it difficult to extract actionable insights. 80% of all attacks leverage just four common attack vectors—credential theft, phishing, exploit vulnerabilities, and botnets (Verizon DBIR). The shortage of…

Read More
1 102 103 104 105 106 3,570