Loading news...
neutech.news

Wednesday, April 30, 2025

Cloud Computing
What’s up with… Project Kuiper, Qualcomm, BT
What’s up with… Project Kuiper, Qualcomm, BT
By TelecomTV Staff

Amazon has launched its first 27 Project Kuiper low-earth orbit satellites, marking a new chapter in the global broadband services sector. However, the launch is seen as late, and the company faces significant competition from Elon Musk's Starlink, which has over 8,000 satellites in orbit and 5 million users across 125 countries. Amazon aims to launch five more Kuiper missions by the end of the year but faces a deadline to have half its constellation in place by mid-summer 2026. In other news, Qualcomm has been given a two-week extension to decide on a takeover bid for UK chip designer Alphawave IP Group. Citi analysts have expressed concerns over BT's share price prospects due to competitive pressure in the UK fiber broadband sector. BT's share price has climbed over 60% in the past year, but the company faces challenges from alternative network providers. Arqit has partnered with Intel to develop a confidential computing solution that protects cloud data and encryption keys. The solution uses Arqit's NetworkSecure and Intel's Trust Domain Extensions to create a secure environment for data processing. AtNorth, a Nordic colocation provider, has signed a 12-year deal with Nokia to provide a multi-megawatt cloud infrastructure deployment at its FIN02 data center site in Finland.

Read full article
Toshiba brings quantum comms to the telecom network
Toshiba brings quantum comms to the telecom network

April 29, 2025 • By Martyn Warwick

Toshiba Europe has successfully completed a trial of coherent, secure quantum communications over an existing telecom network using standard fiber optic cable at room temperature. The trial, which took place in Germany, used simple semiconductor-based devices to transmit quantum information encoded in light over 155 miles of fiber optic cable. This breakthrough could greatly lower the barrier for the real-world deployment of quantum-safe communications, as it eliminates the need for complex cryogenic components. The trial demonstrated the use of twin-field entanglement-based QKD protocol, which enables quantum-key exchange between two parties with a measurement point located midway between them, reducing signal loss and allowing longer-distance communication. This achievement brings us one step closer to a global quantum internet, with the potential to connect major cities and countries together with quantum-safe protection at its core.

Read more
Pepe Escobar: China Steps Up Its Game in the Global AI Race
Pepe Escobar: China Steps Up Its Game in the Global AI Race

April 29, 2025 • By Pepe Escobar

Enjoy in-depth, acute analysis of the most pressing local, regional and global trends at Sputnik! https://sputnikglobe.com/20250429/pepe-escobar-china-steps-up-its-game-in-the-global-ai-race-1121952…

Read more
The Transformative Power of Artificial Intelligence in Cloud Security
The Transformative Power of Artificial Intelligence in Cloud Security

April 29, 2025 • By Shaik Abdul Kareem

The article discusses the growing importance of Artificial Intelligence (AI) in cloud security. As businesses shift operations to the cloud, they face increasing cybersecurity challenges that traditional security systems struggle to address. AI has emerged as a game-changer, enabling real-time threat detection, predictive analytics, and automated responses. By 2028, spending on AI in cybersecurity is expected to exceed $60 billion. The article highlights the benefits of AI in cloud security, including improved accuracy, reduced false alarms, and automated incident response. AI also optimizes resource allocation, reduces cybersecurity costs, and enables predictive analytics to identify potential risks before they occur. The article concludes that AI is indispensable in defending cloud infrastructures and that organizations that embrace AI-driven security will be better equipped to handle evolving threats.

Read more
CompTIA champions workforce talent, securing our future tech footprint, and the impact of the secure by design movement at TechNet Cyber 2025
CompTIA champions workforce talent, securing our future tech footprint, and the impact of the secure by design movement at TechNet Cyber 2025

April 29, 2025 • By CompTIA

CompTIA will address key tech workforce issues at TechNet Cyber 2025, including artificial intelligence, post-quantum cryptography, and secure by design. Dr. James Stanger, CompTIA's chief technology evangelist, will speak at three sessions, discussing topics such as navigating DoD cyber workforce qualifications, analyzing the impact of AI and post-quantum cryptography on workflows, and transforming software development practices to prioritize security. The conference will take place May 6-8 at the Baltimore Convention Center.

Read more
How Companies Can Secure Machine Identities For A Post-Quantum World
How Companies Can Secure Machine Identities For A Post-Quantum World

April 29, 2025 • By Dino DiMarino, Forbes Councils Member, Dino DiMarino, Forbes Councils Member https://www.forbes.com/councils/forbestechcouncil/people/dinodimarino/

The article discusses the threat of quantum computing to modern cryptographic defenses, particularly for non-human identities like machines and IoT devices. Quantum computing can render current encryption schemes obsolete, creating risks such as digital certificate compromise and quantum-enabled man-in-the-middle attacks. To address this, organizations must transition to post-quantum cryptography (PQC) readiness, which involves adopting quantum-resistant encryption algorithms. The National Institute of Standards and Technology (NIST) has standardized the first set of PQC encryption algorithms, and industry-specific regulatory bodies will introduce mandates for enterprises to be PQC-ready. However, transitioning to PQC is complex and requires balancing security, scalability, and compatibility with existing infrastructure. The article highlights the challenges of PQC adoption, including key management overhead, performance, and interoperability. It also provides best practices for a phased migration strategy, such as comprehensive certificate discovery, mapping dependencies on public-key cryptography, and adopting a crypto-agile approach. Overall, the article emphasizes the need for organizations to start planning and executing their migration to quantum-resistant security measures to protect machine identities, maintain operational resilience, and meet compliance and regulatory mandates in a post-quantum world.

Read more
In Chaos, We Must Create: Trade, Tech And Power In A New World Order
In Chaos, We Must Create: Trade, Tech And Power In A New World Order

April 29, 2025 • By Koray Köse, Forbes Councils Member, Koray Köse, Forbes Councils Member https://www.forbes.com/councils/forbestechcouncil/people/koraykose/

The article discusses the current state of global trade, technology, and power dynamics, which are undergoing a significant shift. The author, Koray Köse, argues that the world is experiencing a "reset phase" as it transitions from the 5th Kondratiev cycle (digital revolution) to the 6th cycle (AI, quantum computing, space, and biotech). This shift is characterized by multipolar chaos, with new power centers like China, Russia, and the EU challenging the existing global frameworks. The article highlights the importance of understanding the changing dynamics of global trade, technology, and power, and the need for businesses to adapt and navigate this new landscape. The author emphasizes the need for assertive, educated, and risk-managing leaders who can make informed decisions and take bold actions to shape the future. Some key points from the article include: * The rise of China as a global power, with significant advancements in areas like AI, supply chain tech, and rare earths. * The use of tariffs as a tool for recalibration, with the potential for significant disruptions to global trade and supply chains. * The importance of understanding the sensitivity, elasticity, and fragility of global trade, and the need for strategic and informed decision-making. * The need for businesses to rebuild and adapt their supply chains in response to changing global dynamics, with a focus on agility, adaptability, and risk management. * The growing phenomenon of the "balkanization of technology," with different countries and regions developing their own unique tech standards and regulations. * The importance of capital and cash in navigating the current landscape, with a focus on making structural changes and investing in the future. Overall, the article argues that the current state of global trade, technology, and power is characterized by significant uncertainty and disruption, but also presents opportunities for bold and adaptive leaders to shape the future and succeed in a rapidly changing world.

Read more
QuEra Selected for Phase I of DARPA’s Quantum Benchmarking Initiative
QuEra Selected for Phase I of DARPA’s Quantum Benchmarking Initiative

April 29, 2025 • By QuEra Computing

QuEra, a leader in neutral-atom quantum computing, has been selected by DARPA for Stage A of the Quantum Benchmarking Initiative. The initiative aims to determine if a commercially useful, fault-tolerant quantum computer can be built within a decade. QuEra will use its unique neutral-atom architecture to advance work on fault-tolerant quantum computing and present its plan during Stage A. The company will continue developing its systems and provide evidence of how its approach could meet the cost-benefit threshold required for industrial utility. QuEra is dedicated to advancing quantum computing using neutral-atom architectures and is developing scalable, fault-tolerant quantum processors to address complex computational challenges.

Read more
OIN marks 20 years of defending Linux and open source from patent trolls
OIN marks 20 years of defending Linux and open source from patent trolls

April 29, 2025 • By Steven Vaughan-Nichols

The Open Invention Network (OIN) was formed in 2005 to protect open-source software, particularly Linux, from patent threats. Founded by industry giants like IBM, Novell, and Red Hat, OIN has grown to over 4,000 participants, holding more than three million patents. Its royalty-free cross-license agreement shields open-source projects from litigation, and its mission has expanded to cover various open-source technologies, including Android and Kubernetes. OIN's efforts have been successful in defending against patent trolls, and industry leaders credit the organization for enabling the open-source revolution, driving innovation, and protecting the ecosystem. As open source continues to expand into new domains, OIN will continue to grow and ensure ongoing protection for the technologies driving the digital economy.

Read more
Hitless Upgrades: Keeping The Cloud Alive And Profitable
Hitless Upgrades: Keeping The Cloud Alive And Profitable

April 29, 2025 • By Apeksha Jain, Forbes Councils Member, Apeksha Jain, Forbes Councils Member https://www.forbes.com/councils/forbestechcouncil/people/apekshajain/

The article discusses the importance of maintaining high availability in cloud infrastructure, particularly during network infrastructure upgrades. With over 90% of global organizations relying on the cloud, any downtime can result in significant revenue losses. Traditional upgrade methods, such as redundancy and manual operations, can cause brief disruptions and are not scalable for large cloud data centers. A solution to this problem is "hitless upgrades," which enable seamless software upgrades without disrupting network services. This methodology involves upgrading the control plane software on switches without disrupting the data plane, resulting in no traffic loss. Hitless upgrades are crucial for maintaining continuous network availability, especially in cloud infrastructure, and can help prevent significant revenue losses due to downtime. By investing in hitless upgrade technology, cloud providers can minimize downtime, save money and operational challenges, and keep the cloud alive and profitable. The article highlights the importance of hitless upgrades in ensuring the reliability and efficiency of cloud infrastructure, which is critical for the tech industry and businesses that rely on it.

Read more
How Machine Learning Is Helping Prevent Data Breaches In Web Apps
How Machine Learning Is Helping Prevent Data Breaches In Web Apps

April 29, 2025 • By Melkon Hovhannisyan, Forbes Councils Member, Melkon Hovhannisyan, Forbes Councils Member https://www.forbes.com/councils/forbestechcouncil/people/melkonhovhannisyan/

The article discusses how machine learning is helping prevent data breaches in web applications. According to the Verizon Data Breach Investigations Report, web applications were the target of nearly 50% of all data breaches in 2024. Machine learning-capable security systems use algorithms that learn from data to detect and respond to security threats, offering advantages such as proactive threat detection, faster response time, and reduced false positives. These systems can analyze user and system behavior to detect deviations from normal patterns, identify and classify malware, and enhance phishing detection. However, the effectiveness of machine learning models depends on the quality of the data used to train them, and human oversight is still necessary to avoid over-reliance on automation. Despite limitations, machine learning-powered security tools are a better option than traditional security solutions, and their use is becoming increasingly important as web applications handle more sensitive user data.

Read more
Google Threat Intelligence Group (GTIG) tracked 75 actively exploited zero-day flaws in 2024
Google Threat Intelligence Group (GTIG) tracked 75 actively exploited zero-day flaws in 2024

April 29, 2025 • By Pierluigi Paganini

Here is a concise summary of the news article in 8173 tokens or less: Recent cybersecurity news includes France linking Russian APT28 to attacks on French entities, and the Indian Court ordering the blockage of Proton Mail email service. Apple devices are vulnerable to AirBorne flaws, and the U.S. CISA has added SAP NetWeaver and other flaws to its Known Exploited Vulnerabilities catalog. SentinelOne has warned of threat actors targeting its systems, and Google's Threat Intelligence Group tracked 75 actively exploited zero-day flaws in 2024. A data breach at VeriSource impacted 4 million individuals, and the U.S. CISA has added Qualitia Active! Mail and other flaws to its catalog. Other notable incidents include a large-scale phishing campaign targeting WordPress WooCommerce users, and the discovery of a PoC rootkit that evades traditional Linux detection systems. Storm-1977 is targeting the education sector with password spraying, and the Earth Kurma APT is targeting government and telecommunications organizations in Southeast Asia. Additionally, a data breach at Yale New Haven Health impacted 5.5 million patients, and the Interlock ransomware gang has started leaking data allegedly stolen from a leading kidney dialysis firm. WhatsApp has introduced Advanced Chat Privacy to protect sensitive communications, and Android spyware has been found hidden in mapping software targeting Russian soldiers. The U.S. CISA has also added Apple products, Microsoft Windows NTLM, and other flaws to its Known Exploited Vulnerabilities catalog. Other incidents include a data breach at Legends International, a malvertising campaign targeting crypto users, and a critical flaw in Apache Roller that allows unauthorized access even after a password change. Overall, the cybersecurity landscape remains complex and ever-evolving, with various threat actors and vulnerabilities emerging regularly.

Read more
How U.S. tariffs are reshaping the tech landscape
How U.S. tariffs are reshaping the tech landscape

April 29, 2025 • By Sean Michael Kerner

US President Donald Trump has imposed widespread tariffs as part of his second-term campaign promise. The goal is to bring manufacturing back to the US and fight against unfair trade policies. A minimum 10% tariff on all US imports was announced, with higher tariffs on imports from certain nations, including a 145% tariff on Chinese imports. The technology industry is particularly affected due to its complex global supply chains. Tariffs are a type of tax imposed on imported goods, aiming to make foreign products more expensive and less competitive than domestically produced items. However, the cost of tariffs is usually passed on to consumers through higher prices. The tech sector faces additional complexity as products assembled domestically often contain imported components subject to tariffs. The semiconductor industry is at risk, with most semiconductors manufactured outside the US. Companies like Apple, Amazon, and Nvidia are affected, with increased costs and supply chain disruptions. Some companies, like Nvidia, have announced plans to invest in US manufacturing. The tech industry is exploring options to mitigate the effects of tariffs, including diversifying manufacturing bases and adjusting supply chains.

Read more
(PR) MiTAC Computing Unveils Next-generation OCP Servers and Open Firmware Innovations at the OCP EMEA Summit 2025
(PR) MiTAC Computing Unveils Next-generation OCP Servers and Open Firmware Innovations at the OCP EMEA Summit 2025

April 29, 2025 • By Nomad76

There is no news article provided to summarize. Please provide the article, and I will be happy to assist you with a concise summary.

Read more
Microsoft and Amazon Capex in Focus Amid Potential AI Pullback
Microsoft and Amazon Capex in Focus Amid Potential AI Pullback

April 29, 2025 • By list.metadata.agency

Investors are watching Microsoft and Amazon's earnings reports this week, focusing on their spending on artificial intelligence infrastructure. Reports suggest both companies may be cutting back on AI investments, which could indicate economic caution and recession fears. The two companies, along with Alphabet and Meta, are expected to spend over $300 billion on AI infrastructure this year. Any reduction in spending could hurt valuations and the overall market. Despite this, many analysts remain positive on Microsoft and Amazon, citing strong demand for AI and cloud services.

Read more
VeriSource data breach impacted 4M individuals
VeriSource data breach impacted 4M individuals

April 29, 2025 • By Pierluigi Paganini

Here is a concise summary of the news article in 8173 tokens or less: Recent cybersecurity news includes: * France linking Russian APT28 to attacks on French entities * India ordering the blockage of Proton Mail email service * Discovery of AirBorne flaws that can hijack Apple devices * US CISA adding SAP NetWeaver flaw to its Known Exploited Vulnerabilities catalog * SentinelOne warning of threat actors targeting its systems and clients * Google tracking 75 actively exploited zero-day flaws in 2024 * VeriSource data breach impacting 4M individuals * Various other data breaches, phishing campaigns, and malware attacks targeting organizations worldwide. Additionally, there have been reports of: * APT groups targeting government and telecommunications organizations in Southeast Asia * Ransomware attacks on healthcare and education sectors * Cybercrime groups exploiting vulnerabilities in software and hardware * Law enforcement operations seizing domains and arresting individuals involved in cybercrime * Sanctions imposed on individuals and organizations involved in cyberattacks.

Read more
Microsoft Q3 preview: Wall Street, amid tariff fears, is looking for proof AI is paying off
Microsoft Q3 preview: Wall Street, amid tariff fears, is looking for proof AI is paying off

April 29, 2025 • By Daniel Howley

The provided text is not a news article, but rather a large piece of JavaScript code. However, I can try to extract some relevant information from the beginning of the text. The text starts by mentioning some economic data that is expected to be released, including April's jobs report and March Personal Consumption Expenditures (PCE) index. It also mentions that the S&P 500 has fallen less than 8% in the first 100 days of President Trump's second administration. If you're looking for a summary of a specific news article, please provide the actual article text, and I'll be happy to help.

Read more