8 most exciting AI features and tools revealed at Google I/O 2025

8 most exciting AI features and tools revealed at Google I/O 2025

Sabrina Ortiz/ZDNET The past two Google I/O developer conferences have mainly been AI events, and this year is no different. The tech giant used the stage to unveil features across all its most popular products, even bringing AI experiments that were previously announced to fruition. This means that dozens of AI features and tools were unveiled. They’re meant to transform how you use Google offerings, including how you shop, video call, sort your inbox, search…

Read More

Coffee with the Council Podcast: Introducing the New India-South Asia Regional Engagement Board

Coffee with the Council Podcast: Introducing the New India-South Asia Regional Engagement Board

  This episode of Coffee with the Council is brought to you by our podcast sponsor, Feroot. Welcome to our podcast series, Coffee with the Council. I’m Alicia Malone, Director of Communications and Public Relations for the PCI Security Standards Council. In today’s episode, I’m excited to announce that the Council is launching a new Regional Engagement Board for India and South Asia. Regional Engagement Boards serve as advisors to PCI SSC on payment data…

Read More

VMware Product Release Tracker (vTracker)

VMware Product Release Tracker (vTracker)

This page contains a list of products released by VMware. vTracker is automatically updated when new products are available to download (GA) at vmware.com. If you want to get notified about new VMware Products, subscribe to the RSS Feed. You can also use the JSON export to build your own tool. Feel free to comment when you have any feature requests. 2025-05-20VMware ESXi 7.0 Update 3v [Release Notes]VMware vCenter Server 7.0 Update 3v [Release Notes]…

Read More

How vulnerable are undersea cables?

How vulnerable are undersea cables?

In late 2024 and early 2025, several important data connections across the Baltic Sea were broken, including between Sweden and Lithuania. The cable breaks received a lot of attention and raised questions about the resiliency of undersea cables. Marija Furdek Prekratic, associate professor at Chalmers and researcher in optical networks, says that it is difficult to overestimate how important submarine cables are for the internet. “They provide strategically important connections between different continents and carry…

Read More

Google's viral NotebookLM AI tool gets its own Android app – what you can do with it

Google's viral NotebookLM AI tool gets its own Android app – what you can do with it

Google / Elyse Betters Picaro / ZDNET Google’s high-powered research assistant is getting its own app, and Android users are getting a first look. NotebookLM, which debuted last year, is a free AI research assistant (running on Gemini 2.0’s multimodal understanding capabilities) that helps you better understand any topic. You can give it a number of data sources, including PDF files, links to articles, YouTube video links, and Google Docs or Slides. Also: Google’s viral…

Read More

Barriers to running AI in the cloud – and what to do about them

Barriers to running AI in the cloud – and what to do about them

As organizations rush to deploy and run AI to power not just pilots, but also key use cases supporting vital business functions, the cloud would appear to be the best environment for deployment. At least at first glance. After all, the cloud has unlimited extensibility, with the ability to expand or reduce resources on demand. It doesn’t require capital expenditures to deploy gear and is accessible from anywhere. Overall, one would imagine that AI deployment…

Read More

Cisco Validated at Cisco Live 2025: Your Bridge to Implementation Success

Cisco Validated at Cisco Live 2025: Your Bridge to Implementation Success

Every year, Cisco Live showcases groundbreaking technologies that promise to transform organizations’ operations. However, the actual test of these innovations lies in navigating the complexity of seamless integration into real-world environments. This is where Cisco Validated becomes essential, simplifying the process by providing implementation guidance and best practices to ensure effective deployment of these solutions. For the first time, the Cisco Validated team will have a dedicated zone within the main showcase at Cisco Live…

Read More

Survey: AMD continues to take server share from Intel

Survey: AMD continues to take server share from Intel

Dean McCarron, president of Mercury, said it’s not AMD stealing Intel business but mostly a case of AMD growing faster than Intel. “AMD’s growth rate in the quarter was multiples of Intel’s, resulting in significant server share gains,” he said in a research note. “Server processor shipments were definitively the stand-out segment in the first quarter results, growing sequentially in a seasonally down quarter and seeing substantial growth — nearly 20 percent — on an…

Read More

Uncensored AI Tool Raises Cybersecurity Alarms

Uncensored AI Tool Raises Cybersecurity Alarms

A new AI chatbot called Venice.ai has gained popularity in underground hacking forums due to its lack of content restrictions. According to a recent investigation by Certo, the platform offers subscribers uncensored access to advanced language models for just $18 a month, significantly undercutting other dark web AI tools like WormGPT and FraudGPT, which typically sell for hundreds or even thousands of dollars. What sets Venice.ai apart is its minimal oversight. The platform stores chat histories only…

Read More

Debt Collector Data Breach Affects 200,000 Harbin Clinic Patients

Debt Collector Data Breach Affects 200,000 Harbin Clinic Patients

A third-party data breach has compromised personal information belonging to more than 200,000 Harbin Clinic patients. The breach stems from a cyber-attack in July 2024 targeting Nationwide Recovery Services (NRS), a debt collection agency contracted by the Georgia-based healthcare provider. The incident came to light following unusual activity on NRS systems, which led to a network outage. Investigations revealed that threat actors accessed the NRS network between July 5 and July 11, during which they…

Read More
1 83 84 85 86 87 4,446