New commercial models planned after cloud transition falls €2B behind target SAP has begun to shift focus away from its failure to hit legacy software and cloud migration targets and onto the latest so-called "innovation" elements of its portfolio, such as AI.…
The Register
https://www.theregister.comSorry seems to be the hardest word at Microsoft Opinion Has Microsoft finally reckoned with Windows 11's many failings - or has its OS chief, Pavan Davuluri, simply offered more soothing platitudes to users fed up with bugs and unwanted AI?…
Open letter warns tech is shaping what audiences see while slipping past regulation Europe's broadcasters say smart TVs and voice assistants are fast becoming the next Big Tech gatekeepers, with little sign of Brussels stepping in.…
Analyst says many others wouldn’t mind doing the same, but feel stuck Half of VMware users plan to reduce their use of the virtualization pioneer’s products by 2028, according to a survey by independent analyst firm Virtified.…
‘People don’t like wearing things on their faces and don’t trust those who do’ Science fiction author Neal Stephenson, who coined the term “metaverse” in his 1992 novel Snow Crash, has argued he and others who believed immersive environments would require head-mounted hardware got it wrong.…
Researchers say persona-based prompting can improve works for safety but not for facts Many people start their work with AI by prompting the machine to imagine it is an expert at the task they want it to perform, a technique that boffins have found may be futile.…
'It freakin' worked' says Rob Joyce - and shows how relentless AI agents can find holes humans miss RSAC 2026 The now-infamous Anthropic report about Chinese cyberspies abusing Claude AI to automate cyberattacks was a Rorschach test for the infosec community, according to former NSA cyber boss R...
Washington content to be represented by actual empty chairs RSAC 2026 Back in the day (circa 2023) when cybercrime group Scattered Spider and its help-desk voice-phishing calls were a relatively new threat, the feds considered pulling the government's top cyber-threat hunters and their private-s...
Customers are 'excited' says one solution provider Snowflake is putting cash and kinetic energy behind the idea that AI works best in its platform.…
Here's where you ought to spend your security billable hours budget this year Strengthen your MFA policies, double-down on anti-phishing training, and for Jobs' sake, patch all your vulns right away. The past year of intelligence collected by Cisco's Talos threat hunters suggests that attackers a...
Digital twins of leaders may be plausible as novelty acts, but not really welcome Imagine that your boss is too busy to show up at that meeting you called so she sends a bot of herself instead. With a digital twin, even your company's CEO - the one who spends all his time on the corporate jet - c...
Zenity CTO demos 0-click AI agent exploits on stage at RSAC RSA 2026 There's a very simple reason why just about every enterprise AI agent is vulnerable to zero-click attacks, according to Michael Bargury, CTO of AI security company Zenity.…
10GW server farm, 10GW of new generation, and $4.2bn grid upgrade. And someone else is paying for the uranium cleanup Softbank's SB Energy is redeveloping Department of Energy (DoE) land in Ohio for a massive datacenter campus, adding extra generation facilities and power infrastructure alongside...
Expendable military drones are so 2025 The US Army just took receipt of what may be the coolest unmanned drone ever flown by the military: A full-sized Black Hawk helicopter. …
Broader platform coverage lands, if developers can tolerate the rough edges AvaloniaUI has previewed MAUI support for Linux and WebAssembly browser applications — platforms Microsoft's own cross-platform .NET framework lacks — but low adoption and persistent bugs are likely to constrain uptake.…
Claims it can analyze millions of daily events with 98 percent accuracy Google's Gemini AI agents are crawling the dark web, sifting through upward of 10 million posts a day to find a handful of threats relevant to a particular organization.…
Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate – and the No. 1 tactic used when breaking i...
In space, no one can hear you being petty SpaceX has fired back at Amazon with a letter to the US telecoms regulator, after Amazon objected to its plans for orbiting datacenters.…
US analytics firm handed access to sensitive intel, raising yet more questions about vendor lock-in US data miner Palantir has quietly landed inside the UK's financial watchdog, plugging into a trove of sensitive data as Whitehall simultaneously insists it wants to wean itself off exactly this ki...
More cores, higher clocks, and lower prices? What's not to like? Review It's a tough time to be a PC enthusiast. Between the memory crunch and the AI boom driving up prices on storage, DDR5, and GPUs, it's gotten prohibitively expensive to build a PC.…