Your ‘new’ Seagate data center hard drive is likely an used one

Your ‘new’ Seagate data center hard drive is likely an used one

The cryptocurrency connection: how used HDDs entered the market The affected hard drives reportedly stem from cryptocurrency mining farms, particularly those that mined Chia cryptocurrency. Unlike traditional cryptocurrency mining that relies on GPUs, Chia mining is storage-intensive, leading to a surge in HDD demand during its peak. As Chia’s profitability declined, many mining operations shut down, offloading their heavily used HDDs into secondary markets. Some of these drives have had their internal usage logs reset…

Read More

Las decisiones estratégicas en IA de los CEO se ven aminoradas por la falta de conocimiento

Las decisiones estratégicas en IA de los CEO se ven aminoradas por la falta de conocimiento

Coste de oportunidad: de la inacción a la irrelevancia Del informe se desprende que más de la mitad de los CEO (53%) teme que la falta de inversión en tecnología les suponga perder ventaja competitiva, mientras que dos terceras partes están preocupados por los costes de oportunidad. Si no invierten en tecnología ahora, los directores ejecutivos esperan mayores costes operativos, menores ganancias, menor productividad y menor participación en el mercado. Los CEO recurren a la…

Read More

Nokia changes CEO; Intel data center chief takes over

Nokia changes CEO; Intel data center chief takes over

Nokia has announced that CEO Pekka Lundmark will step down. He took up the position in 2020. He will be replaced by Justin Hotard, who is currently Intel’s Chief Data Center Officer and has previously held executive positions at technology companies such as Hewlett Packard Enterprise and NCR Corporation. “I am honored to have the opportunity to lead Nokia, a global leader in connectivity with a unique technology heritage. Networks are the backbone that drives…

Read More

UK Military Fast-Tracks Cybersecurity Recruitment

UK Military Fast-Tracks Cybersecurity Recruitment

The UK military is fast-tracking the recruitment of specialist cybersecurity roles, offering candidates one of the highest starting salaries in the armed forces. Cyber recruits will receive a starting salary of over £40,000, with opportunities for additional skills-based pay as they gain expertise and experience. The UK Ministry of Defence (MoD) announced the new, bespoke entry route into the military for aspiring cyber professionals on February 6. This scheme will see cyber recruits’ basic training…

Read More

This app makes using Ollama local AI on MacOS devices so easy

This app makes using Ollama local AI on MacOS devices so easy

ZDNET I’ve turned to locally installed AI for research because I don’t want third parties using my information to either build a profile or train their local language models (LLMs).  My local AI of choice is the open-source Ollama. I recently wrote a piece on how to make using this local LLM easier with the help of a browser extension, which I use on Linux. But on MacOS, I turn to an easy-to-use, free app…

Read More

Experts Dismayed at UK’s Apple Encryption Demands

Experts Dismayed at UK’s Apple Encryption Demands

Privacy rights groups and security experts have slammed a reported demand from the British government to access end-to-end encrypted (E2EE) data stored in Apple’s iCloud service. The Home Office demand, which by law cannot be publicized, is most likely to have been made under the Investigatory Powers Act (IPA) – a controversial “Snooper’s Charter” which gives the government the right to force tech firms to unmask users suspected of serious crimes. The UK has, until…

Read More

A 5-point checklist before you select and implement an AI agent platform

A 5-point checklist before you select and implement an AI agent platform

Ensure their environment is intuitive, easy to test your agents within, and has enhanced options for your agents such as short- and long-term memory. Plus, there should be features for responsible AI — reflection, groundedness, and context relevance — and safe AI — fairness and bias, toxicity check, human-in-the-loop, and PII redaction. You’ll also want to have, at a glance, visibility into your credits used as part of your subscription, as well as value-added features…

Read More

Europol Warns Financial Sector of “Imminent” Quantum Threat

Europol Warns Financial Sector of “Imminent” Quantum Threat

Europe’s financial services sector must begin planning now for the transition to quantum-safe cryptography, as the risk of “store now decrypt later” (SNDL) attacks grows, Europol has warned. The policing group issued the calls at its Quantum Safe Financial Forum (QSFF) event on Friday. Quantum computers are expected in time to be able to break public key cryptography (asymmetric encryption), which is how global financial transactions, authentication processes and digital contracts are currently secured. Although…

Read More

Key Takeaways from the NCSC Annual Review 2024

Key Takeaways from the NCSC Annual Review 2024

In early December 2024, the UK’s National Cyber Security Center (NCSC) released its eighth Annual Review. While the report’s primary focus is to recap the NCSC’s activities over the past year, it also offers invaluable insights into how the UK thinks about and plans to act on cybersecurity. In this article, we’ll look at a few of its key takeaways. UK in “A Contest for Cyberspace” The overarching theme of the NCSC Annual Review 2024…

Read More

“Quishing” – The Emerging Threat of Fake QR Codes

“Quishing” – The Emerging Threat of Fake QR Codes

QR codes have revolutionized digital interactions, offering quick access to websites and services and adding a layer of security to many apps. These quick and seemingly innocent codes are everywhere — however, their widespread use has made them a prime target for scammers. The corruption QR codes leaves everyone vulnerable. However, there are simple methods to protect against this threat. What Is “Quishing”? In quishing attacks, scammers use fake QR codes to redirect people to…

Read More
1 118 119 120 121 122 3,795