Month: May 2022

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today! With the climate change crisis looming, many are betting on novel technological solutions such as carbon capture. We certainly need these sorts of solutions
0 Comments
Samsung Galaxy M13 5G has reportedly been spotted on the Federal Communications Commission’s (FCC) certification database. The affordable smartphone is expected to be launched soon. The FCC database showed the model number, SM-M135M, of the upcoming addition to Samsung’s M series. The database also hints that the tested charging adaptor would likely support 15W fast
0 Comments
SpaceX has announced that its satellite Internet service, Starlink, is now available in 32 countries. The company shared an availability map for Starlink, marking countries under ‘Available’, ‘Waitlist’, and ‘Coming Soon’ segments. Primarily countries in Europe and North America fall under ‘Available’. Furthermore, the company claims that in these regions, Starlink is ready to be
0 Comments
Android TV now has over 110 million monthly active users (MAU), Google revealed at its annual developer conference on Thursday. The company has announced several new features and tools coming to the next versions of Google TV and Android TV that are aimed at improving performance and quality, while improving accessibility and enabling multitasking. While
0 Comments
Google on Thursday announced the creation of a new “Open Source Maintenance Crew” to focus on bolstering the security of critical open source projects. Additionally, the tech giant pointed out Open Source Insights as a tool for analyzing packages and their dependency graphs, using it to determine “whether a vulnerability in a dependency might affect
0 Comments
Zyxel has moved to address a critical security vulnerability affecting Zyxel firewall devices that enables unauthenticated and remote attackers to gain arbitrary code execution. “A command injection vulnerability in the CGI program of some firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device,” the
0 Comments