Nvidia CEO Jensen Huang sees a future where billions of robots serve humans, bringing in trillions of dollars in revenue for the company.
To meet that goal, Nvidia on Monday unveiled a new computing device that will go into high-performing robots that could then try to replicate human behavior.
The Jetson Thor robotics computers are capable of AI intelligence. The devices will help robots hear, detect patterns, make decisions and act. Many of the AI capabilities arise from generative AI (genAI) technologies available today.
“Thor…is the ultimate platform for physical AI and robotics built for the age of reasoning AI running at the edge — low power, high performance, real time,” Deepu Talla, vice president of robotics and edge AI at Nvidia, said during a news briefing.
The boards have Nvidia’s flagship Blackwell graphics processor, which power the latest genAI models. Users currently have to access those GPUs in the cloud, which is why the robotic implementation of Blackwell in Thor is different. Robots make real-time decisions, and the GPUs can run AI on the device without cloud access or internet connections.
“…Typically, your actuation is in fractions of a second…,” Talla said. “If you go to the cloud, typically the latency is hundreds of milliseconds…. That’s why you want to do as much as possible at the edge.”
The Thor developer board delivers roughly 2,070 teraflops of low-precision FP4 data performance; that pales in comparison to Blackwell datacenter GPUs, which deliver 20 petaflops. While 10 times faster than the robotics GPUs, they also consume significantly more power.
The robotics computers draw between 40 and 130 watts of power. Given that robots will operate on batteries, that adds up to two times the power draw of standard work laptops, which draw between 30 watts to 60 watts of power.
Robots with Thor are expected to be used in heavy industries with physical labor such as manufacturing, oil and gas, and mining. “Our vision for robotics is not just humanoid,” Talla said. “We think general purpose robotics is extremely important so that they reason out about different tasks that they encounter in the real world.”
Nvidia has recently made a variety of announcements involving AI robots. Earlier this month, the company announced Cosmos Reason, a vision AI model that helps robots make better decisions by evaluating their surroundings. The model can process pixels in video input to process information.
Thor is the hardware where these AI enhancements will come to life, Talla said. “Because of reasoning we are able to tackle any model — adding reasoning to it allows it to generalize even more, which enables us to solve problems that [were] previously unsolvable,” Talla said.
The $3,499 AGX Thor computer system has 14 ARM CPU cores, 128GB of RAM, and Gigabit Ethernet ports. Nvidia also has the T5000 and T4000 production boards on which developers can build robots.
The T5000 board draws 130 watts of power, while the T4000 draws 70 watts, making it suitable for robots with smaller batteries.
More Nvidia news and insights:
Nvidia turns to software to speed up its data center networking hardware for AI
Nvidia: ‘Graphics 3.0’ will drive physical AI productivity
Nvidia launches Blackwell-powered RTX Pro GPUs for compact AI workstations
Nvidia’s new genAI model helps robots think like humans
Nvidia patches critical Triton server bugs that threaten AI model security
Source:: Computer World
US President Donald Trump’s announcement Friday that the US government is taking a 9.9% stake in Intel to defend national interests will shift the dynamics of IT procurement globally.
“Intel’s new identity as a government-backed ‘national champion’ represents a structural shift in how enterprises must evaluate supplier relationships,” said Sanchit Vir Gogia, chief analyst at Greyhound Research. “Technology buyers have framed procurement primarily in terms of cost, performance, and roadmap alignment. Intel’s repositioning disrupts that calculus.”
[ Related: More Intel news and insights ]President Trump rounded up the size of the government’s stake when he announced it on Truth Social: “It is my Great Honor to report that the United States of America now fully owns and controls 10% of INTEL, a Great American Company that has an even more incredible future.”
“The United States paid nothing for these Shares, and the Shares are now valued at approximately $11 Billion Dollars.,” Trump wrote.
Intel’s version was a little different: It said that the US government “will make an $8.9 billion investment in Intel common stock, reflecting the confidence the Administration has in Intel to advance key national priorities and the critically important role the company plays in expanding the domestic semiconductor industry.”
The truth lies somewhere in between: The $8.9 billion comprises the capitalization of a $3.2 billion grant from the Department of Defense’s Secure Enclave program and $5.7 billion in remaining CHIPS Act grants which, with the $2.2 billion in CHIPS Act grants Intel has already received, make up Trump’s $11 billion figure.
The deal makes the US government Intel’s largest shareholder, although it will have no representation on Intel’s board, and has agreed to vote with the board on shareholder matters. Intel has also given the government the right to purchase an additional 5% stake if the company loses majority control of its foundry business, it said.
“As the only semiconductor company that does leading-edge logic R&D and manufacturing in the US, Intel is deeply committed to ensuring the world’s most advanced technologies are American made,” Intel CEO Lip-Bu Tan said in the statement.
The new procurement reality
This recasting of Intel’s role in the industry as a government-backed national champion creates a fundamental shift in supplier evaluation, moving beyond traditional cost-performance metrics to include political considerations.
Neil Shah, VP for research at Counterpoint Research, agreed: “With Intel’s growing role as a national champion, IT leaders need to recalibrate their procurement strategies. Intel’s government-backed status provides a more robust supply chain, reducing disruption risk from global geopolitical tensions.”
The recalibration becomes more complex when considering Intel’s dual role as a commercial vendor and national security asset, which creates potential conflicts enterprises must understand when evaluating future technology roadmaps.
The core concern centers on resource allocation. “The risk for commercial customers is that engineering bandwidth may be diverted away from accelerating competitive product roadmaps in AI, data-center silicon, and edge workloads,” Gogia warned.
However, Dr. Danish Faruqui, CEO at Fab Economics, disputed this concern: “R&D resource allocations for developing leading edge fabrication technologies are the same for both public and private productization, so enterprise customers should not worry about delay in technology maturity.”
National security vs financial security
The impact may be more subtle, affecting Intel’s commercial focus. Shah noted that government support “could lead Intel to prioritize national security initiatives over commercial needs, potentially impacting its product roadmaps and cost competitiveness.”
Beyond these resource allocation concerns, the US government’s move creates a two-tiered global market structure affecting enterprises differently based on geographic location and regulatory requirements.
International enterprises face the most significant challenges. “For European and Asian CIOs, Intel’s government-backed monopoly raises concentration risk, as supply will inevitably be prioritized for US customers,” Gogia warned.
Paradoxically, Intel’s government support could strengthen competition by freeing rivals from confrontation with a subsidized competitor. Shah suggested this “could create an opening for rivals like AMD, Nvidia, and Qualcomm to innovate more freely in commercial markets.”
The competitive landscape benefits from broader CHIPS Act funding. Faruqui emphasized that domestic sourcing extends beyond Intel: “Whether leading edge fabrication happens at Intel, TSMC or Samsung foundry on US soil, there should not be any forced choices for customers.”
Concerns persist for Intel’s foundry business
These competitive dynamics become particularly relevant when examining Intel’s foundry division, where government backing provides financial stability, but analysts questioned whether this resolves fundamental business challenges.
The deal offers crucial breathing room for Intel’s struggling manufacturing-for-hire business, according to Alvin Nguyen, senior analyst at Forrester. “This $8.9B investment provides a financial lifeline as they find foundry customers and develop new processes,” said Nguyen. However, he cautioned that “this does not mean the risks associated with their foundry business are gone.”
The core issue remains attracting customers rather than capital availability. Gogia explained that “despite substantial subsidies, the foundry division continues posting multi-billion-dollar losses with limited customer traction.” The problem, he noted, is that “subsidies extend Intel’s financial runway but don’t address structural competitiveness weaknesses” such as yield rates and process maturity that customers demand.
Industry experts emphasized that government cash alone cannot solve market-driven challenges. “US government equity holdings is no solution for attracting foundry customers,” Faruqui noted.
This suggests Intel must still prove its technical capabilities and service quality to win business from major chip designers, regardless of federal support.
Keep a close eye on the roadmap
Given these multifaceted challenges and opportunities, analysts provided guidance for navigating Intel’s transformation into a government-backed supplier, emphasizing continuous monitoring and strategic portfolio management.
Performance tracking becomes crucial given Intel’s hybrid status. “IT leaders should closely monitor Intel’s progress on its technology roadmap and price competitiveness to ensure government backing translates into tangible benefits,” Shah said.
Strategic positioning requires balancing stability against limitations. Gogia recommended treating “Intel’s foundry as a politically secured option, useful for compliance-heavy workloads where domestic sourcing is required. But it should not be relied upon as the sole provider of leading-edge capacity.”
Source:: Computer World
By Hisan Kidwai Wordle is the super fun game from the NYT, which challenges players to use their extensive…
The post Wordle Hints & Answers For Today: August 25 appeared first on Fossbytes.
Source:: Fossbytes
By Thomas Cuvelier Vibe coding is redefining who can build software. By enabling code generation through natural language prompts, it’s quickly gained traction among startups and indie developers. But the biggest opportunity lies ahead: the enterprise. The rapid rise of Lovable — which recently raised a $200mn Series A at a $1.8bn valuation — illustrates the remarkable progress of vibe coding. Having backed the Swedish startup at the seed stage, I see this as just the beginning. What’s next? A fundamental upheaval of who can build software — a cultural shift set to transform entire industries. The vibe coding revolution The disruptive power of…This story continues at The Next Web
Source:: The Next Web
By Hisan Kidwai Octordle is like Wordle, only ten times more difficult, because instead of solving four words, you…
The post Today’s Octordle #1309 Hints & Answers for August 25, 2025 appeared first on Fossbytes.
Source:: Fossbytes
By Hisan Kidwai Free Fire Max is one of the most popular games on the planet, and for good…
The post Garena Free Fire Max Redeem Codes for August 24 appeared first on Fossbytes.
Source:: Fossbytes
By Hisan Kidwai Octordle is like Wordle, only ten times more difficult, because instead of solving four words, you…
The post Today’s Octordle #1307 Hints & Answers for August 23, 2025 appeared first on Fossbytes.
Source:: Fossbytes
By Hisan Kidwai Free Fire Max is one of the most popular games on the planet, and for good…
The post Garena Free Fire Max Redeem Codes for August 23 appeared first on Fossbytes.
Source:: Fossbytes
In today’s multi-device, work-from-anywhere world, unified endpoint management (UEM) is crucial for efficiency and security, providing a “single pane of glass” for managing mobile, desktop, and cloud environments. Microsoft Intune is a leading example of a UEM product that has continuously expanded to meet IT’s evolving needs.
What is Microsoft Intune?
Microsoft Intune is a suite of management tools that are the core of Microsoft’s UEM strategy as well as part of Microsoft 365’s broader technology stack. The company’s goal is to simplify managing mobile devices and applications, PCs, and other devices — and to reduce complexity and cost for IT teams.
For example, Intune’s mobile device management (MDM) capabilities are built to allow IT administrators to enforce security policies, remotely wipe devices, and manage configurations across heterogeneous platforms. Its mobile application management (MAM) features are designed to help businesses manage applications on both corporate and personal devices — enabling deployment, updates, and retirement of applications — and to protect corporate data within apps, preventing data leaks without disrupting user experience. (Download our 2025 UEM vendor comparison chart for a comprehensive list of capabilities in Intune and its main competitors.)
Today, Intune leverages artificial intelligence (AI) and automation to enhance UEM security, improve end-user experience, and simplify operations.
Intune through the years
If you’re having a hard time keeping track of Microsoft’s UEM strategy, you’re not alone. What began as Windows Intune in 2010 evolved — and survived an identity crisis — to land where it is today as arguably the leader in the UEM market.
When Intune first arrived, companies were still in the throes of figuring out how to manage the sudden onslaught of devices accessing corporate data and networks — fallout from the bring-your-own-device (BYOD) trend that took off after the release of Apple’s iPhone in 2007.
To address the emerging enterprise mobility management (EMM) needs of businesses, Microsoft launched its Intune cloud service in 2010 and added numerous mobile management features in subsequent years. In 2019, Microsoft decided to combine its Intune UEM platform with its longstanding Configuration Manager (ConfigMgr) on-premises management platform, enabling users to access both through a single interface and rebranding the combined service as Microsoft Endpoint Manager. A few years later, in 2022, the service was rebranded back to Microsoft Intune, and the next year Microsoft released the Intune Suite, which consolidated its endpoint management and security solutions to streamline protection for both cloud and on-premises endpoints.
The timeline below shows the many self-imposed twists and turns of Microsoft Intune.
How Windows Intune became Microsoft Intune, then became Microsoft Endpoint Manager, and then became Microoft Intune again.Foundry
Why Intune is a UEM leader
Microsoft’s UEM strategy revolves around simplifying management with a cloud-first approach and reducing complexity and cost for IT teams by leveraging AI and automation to enhance endpoint security, improve end-user experience, and simplify operations. This jibes with Gartner’s forecast for the UEM market. The research firm predicts that by 2029, more than 50% of organizations will adopt autonomous endpoint management (AEM) capabilities within advanced endpoint management and digital employee experience (DEX).
Driven by corporate mobile device programs, hardware management has been shifting away from a Windows-dominant world to one that is increasingly diverse and includes iOS, Android, and macOS devices. As more worker tasks are carried out on mobile devices, the momentum behind UEM, and its capability to manage all user-facing devices from a single console, continues to grow.
While it’s a competitive market, Microsoft is widely recognized by experts and analysts such as IDC and Gartner as a leader in the UEM sector. According to IDC’s 2024 MarketScape for Worldwide UEM Software report, Microsoft is a leader in the category. The research firm notes that an important trend in UEM is the need account for “unmanaged” devices, specifically through mobile application management (MAM) features that secure corporate data and apps without full device enrollment.
Intune’s integration with other Microsoft services is an advantage it has over competitors. For example, it’s designed to work seamlessly with Azure Active Directory.
Microsoft Intune is designed to allow you to manage your organization’s devices and supports Android, Android Open Source Project (AOSP), iOS/iPadOS, Linux Ubuntu Desktop, macOS, ChromeOS, and Windows client devices.Microsoft
How to get Microsoft Intune and what you’ll pay for it
Microsoft Intune is a standalone product, but it is also included with certain Microsoft 365 plans. While Basic Mobility and Security is part of the Microsoft 365 plans, it’s a separate, free feature set and is not a full version of Intune. The following versions of Microsoft 365 include the complete version of Intune:
Microsoft 365 Business Premium
Microsoft 365 Firstline 3
Microsoft 365 Enterprise E3
Microsoft 365 Enterprise E5
Microsoft 365 Education A1
Microsoft 365 Education A3
Microsoft 365 Education A5
Enterprise Mobility & Security E3
Enterprise Mobility & Security E5
As a subscription service, Microsoft charges companies on a per user/per month basis in three tiers, which can also be purchased as standalone licenses or in bundles with other Microsoft products. The most common pricing is based on a per-user, per-month model with an annual commitment and breaks down as follows:
Microsoft Intune Plan 1: This core plan includes essential endpoint and application management features. It costs $8 per user per month.
Microsoft Intune Plan 2: This is an add-on to Plan 1, providing advanced capabilities. It costs $4 per user per month.
Microsoft Intune Suite: Bundles all features from Plan 1 and Plan 2, along with additional advanced security and management solutions. It costs $10 per user per month as an add-on to Plan 1.
Additional information on Intune pricing
Add-ons: Advanced features such as Remote Help, Endpoint Privilege Management, and Endpoint Analytics can also be purchased as individual add-ons.
Free Trial: Microsoft offers a 30-day free trial with 100 user licenses, allowing organizations to test the service before committing to a purchase.
Device-only licenses: There are also device-only subscriptions available for specific use cases like kiosks or shared devices that are not tied to a particular user.
Looking ahead: Intune in development
What’s next for Intune? According to Microsoft, these features are currently in development for Intune and will likely be available in 2025:
Microsoft Intune Suite: A new dashboard for endpoint privilege management (EPM) is in design and will provide insights into user status and file elevation trends. EPM will also support Azure Virtual Desktop single-session virtual machines.
App management: Intune app protection policies for Apple’s iOS/iPadOS will allow blocking data sync from policy-managed app data to app widgets, enhancing data protection, according to Microsoft.
Device management: New Microsoft Graph permissions for API calls to device management endpoints will require updates to tools and scripts should be available in August. Remote wipe actions will support multiple administrative approvals. Intune Device control policy will support devices managed by Microsoft Defender for Endpoint.
Monitoring and troubleshooting: Improved declarative Apple software update reports will offer near real-time details on update failures, pending updates, and installation status.
Significant Intune notices
Updates to the latest Intune App SDK and App Wrapping Tool for iOS will be required to support iOS/iPadOS 26 and ensure continued app protection policy enforcement. Apps will need to be registered with Microsoft Entra.
Intune will move to support iOS/iPadOS 17 and later, and Android 10 and later for user-based management methods, with Microsoft expected to drop support for older OS versions.
Updates are coming for strong mapping for SCEP and PKCS certificates to address elevation of privilege vulnerabilities.
New standalone settings for blocking screen capture, Genmojis, and Writing tools in Apple Intelligence will be introduced.
7 keys to UEM success
>To be successful, any comprehensive UEM system needs to integrate with client management tools and meet the following objectives, according to Gartner:
>
Provide a single console to configure, manage, and monitor traditional mobile devices, PCs, and device management of IoT assets.
Unify the application of data protection, device configuration, and usage policies.
Provide a single view of multi-device users for better end-user support and to gather detailed workplace analytics.
Act as a coordination point to orchestrate the activities of related endpoint technologies such as identity services and security infrastructure.
Use AI and machine learning to automate tasks, proactively fix issues, and reduce the need for human intervention.
Be tightly integrated with digital employee experience (DEX) tools. This involves monitoring and analyzing telemetry from endpoints, apps, and networks to measure and improve the user experience
Integrate with endpoint security platforms (EPP) and endpoint detection and response (EDR).
This article was originally launched in September 2018 and most recently updated in August 2025.
Related reading:
What is UEM? Unified endpoint management explained
UEM buyer’s guide: How to choose the right unified endpoint management platform
Download our UEM vendors comparison chart
Source:: Computer World
Apple is seeing rapid growth in enterprise markets, and in the wake of the Crowdstrike disaster and Microsoft’s forced Windows 11 upgrades, there’s no good reason for that trend to end. It’s no wonder its platforms have become such a big target for organized crime — meaning constant security vigilance is necessary for every user as the scale of attacks intensifies.
That doesn’t mean Apple’s products are insecure; they’re not. But no platform is completely secure, and as more enterprise data is held on those platforms it becomes increasingly essential to ensure you have the correct security stance in place.
How much is too much?
Apple’s highly-skilled security teams are the first line of platform defense to protect system integrity, and they know how constant the attempts against its platforms have become. We don’t know how constant, but only this week we’ve heard of two relatively serious security warnings, including the seventh zero-day attack this year.
CrowdStrike (remember it?) recently warned of a spike in exploits targeting Macs on the part of a bunch of cybercriminals known as Cookie Spider. These attacks use malware infested advertising to trick people into visiting fraudulent help websites where they are fooled into executing malicious commands that steal their data.
The second, perhaps more disturbing, zero-day exploit is one that has been actively exploited in “extremely sophisticated” attacks against “specific targeted individuals.” That strongly suggests it to have been used in a sophisticated spyware campaign. Known as CVE-2025-43300, it enables attackers to compromise Apple device security just by getting the user to open a malicious image file. How severe is this exploit? Very. The Cybersecurity and Infrastructure Security Agency (CISA) has given this vulnerability a severity rating of 8.8 out of 10.
One reason the latter attack exploits malicious images is because Apple has made it much harder to use more conventional link-based attacks. These barriers are far from being complete — Apple has now patched a total of seven zero-day attacks this year — and it’s only August.
In discussing this, Adam Boynton, senior security strategy manager at Jamf, suggested the zero-day attack might have been used by one of the surveillance mercenaries. “While Apple has not confirmed whether this specific flaw was linked to spyware, similar vulnerabilities in ImageIO and WebKit have previously been used in Pegasus campaigns,” he said.
Surveillance-as-a-service
Pegasus is just one of a hungry horde of amoral, zero-day spyware attacks to be sold for profit by surveillance-as-a-service firms, many of which seem to emanate from Israel.
“This is a zero-click exploit that requires no user interaction, and can be triggered simply by processing a maliciously crafted image file, which could be delivered through various channels including messages, emails, or web content,” according to Qualys security research manager Mayuresh Dani.
Developing such attacks is very costly, which suggests the level of resources being thrown into breaking Apple device security. (It’s worth noting that these are the kinds of resources that would also be used to identify and exploit any security backdoors put in place at an operating system level in the event authoritarian surveillance-loving governments get their way.)
That cost certainly doesn’t seem to be a massive turn-off to the highly sophisticated and well-resourced companies profiting from the delivery of digital chaos. Many of these firms, such as NSO Group, have faced international sanctions and lawsuits, which doesn’t seem to have stopped them at all. Meanwhile, many of the exploits they create are sold to repressive governments that use them against journalists, dissidents, political rivals and others. Beyond that, older, patched exploits have reportedly been traded on the dark web, meaning these dangerous attacks can proliferate.
The danger of such attacks should be top of mind for any prominent business executive, as enterprises can be targets, too — particularly as corporate execs jet around the world. Travelers should now carry burner phones with only limited access to important corporate (or personal) data.
Don’t be paranoid, but be aware
The growing sophistication and frequency of attacks reflect Apple’s growing ecosystem but underline the obvious need to maintain a robust security posture. That includes keeping all your devices updated with the latest security patches and ensuring that all the systems you do use are running — or capable of running — the latest security updates.
While Apple is evolving, attackers are evolving in tandem. Are all your systems updated with the latest security patches?
You can follow me on social media! Join me on BlueSky, LinkedIn, and Mastodon.
Source:: Computer World
By Hisan Kidwai Octordle is like Wordle, only ten times more difficult, because instead of solving four words, you…
The post Today’s Octordle #1306 Hints & Answers for August 22, 2025 appeared first on Fossbytes.
Source:: Fossbytes
By Deepti Pathak HP has launched the new Omen 16 gaming laptop in India, designed for gamers who want…
The post HP Omen 16 With AMD/Intel Chips & RTX 5070 Ti Launched in India appeared first on Fossbytes.
Source:: Fossbytes
By Ray Fernandez The European space industry is booming. Yet despite the boom, the industry is struggling to find commercial buyers for arguably its most valuable output: data. At the Living Planet Symposium 2025 in Vienna, the European Space Agency (ESA) and private sector leaders laid out Europe’s bold space ambitions and called for increased cooperation to address deep commercial gaps. Josef Aschbacher, ESA’s director general, highlighted one key focus. “Earth observation within the European Space Agency is a major priority,” he said. ESA has had recent successful missions. Its miniature satellite Φsat-2, for example, has started transmitting high-definition images back to Earth…This story continues at The Next Web
Source:: The Next Web
Google this week released significant AI-powered content generation and consumption updates to its Workspace productivity suite.
The company said it has expanded the availability of its Whisk image-generation model to Google AI Ultra for Business customers in 77 countries. Whisk generates new images by referencing uploaded images and text descriptions in a prompt.
Pricing for the Google AI Ultra Workspace starts at $249.99 per month, but varies depending on the features selected.
Google is also doubling the number of images and videos generated by Whisk and the video generation model Flow for its Google AI Ultra for Business customers. The number of credits has doubled to 25,000, the company said in a recent blog post.
Google also added a tool that can create audio versions of documents in Google Docs. A “Listen” menu item allows for the creation of the audio documents, letting users listen to them in a podcast-like format. That, Google suggested, could help in catching written errors.
“You also have the option to customize your audio experience with a variety of voices and playback speeds to match your personal preferences,” Google explained in a blog post.
The audio option was likely adapted from Google’s NotebookLM AI tool, which creates audio summaries of long documents.
Another new feature in Google Chat will summarize unread messages in chats and private channels, saving users from having jump between windows to catch up.
Google is also previewing interface updates in Google Meet focused on hardware controllers. These changes include single-click buttons for hardware controls such as mute and hand-raise, so users can “concentrate on their meetings rather than searching for controls,” the company said.
The UI preview for Meet is being rolled out for system administrators to test before its general availability in approximately six weeks. Admins will need to activate the feature for individual users.
That follows changes Google made last month to the timeline and way it rolls out beta features. System administrators can control when and who can try out beta features in Workspace before general availability.
Source:: Computer World
By Hisan Kidwai Apple Store gift cards are a convenient gifting option for many people, since they allow a…
The post 4 Ways To Check Apple Store Gift Card Balance (2025) appeared first on Fossbytes.
Source:: Fossbytes
By Deepti Pathak Peroxide has been one of the most popular Roblox games, and for good reason. The game…
The post Peroxide Trello & Discord Link (2025) appeared first on Fossbytes.
Source:: Fossbytes
By Thomas Macaulay A new pocket-sized Starlink alternative promises secure military communications — safe from interference by billionaire CEOs. The system, named the RU1, was unveiled today by Swedish startup TERASi. It’s billed as the world’s smallest and lightest mm-Wave radio, a form of communications that offers blazing-fast speeds and huge bandwidth. James Campion, the CEO and co-founder of TERASi, describes the portable device as “the GoPro of backhaul radios.” “RU1 can be deployed in minutes to keep units connected in fast-changing environments,” Campion told TNW. The devices, he continued, can be installed on tripods or drones. Multiple RU1s can then link into…This story continues at The Next Web
Source:: The Next Web
A recent survey by MIT found that 95% of generative AI (genAI) projects failed to have a meaningful financial impact. But for companies making productivity tools, adopting the technology has become a matter of survival.
Everyone from big-name companies like Microsoft and Google to others like Zoom, Slack and Twilio, shifted gears (and business practices) in recent years to make seemingly overnight changes to their wares, plugging in AI and adding agents atop well-laid workflows and legacy business models.
Now, those genAI tools are widely used to make their products easier to use, with AI helpers providing new insights by analyzing old data that until now lay siloed and dormant.
Microsoft and Google are respectively adding Copilot and Gemini features to their productivity suites at a quickening pace. It’s a matter of survival that “will depend on how quickly companies adopt AI tools as a new way of doing things, and how quickly their customers adopt the new services,” said Jack Gold, principal analyst at J. Gold Associates.
Other companies have taken note: OpenAI, which spurred the genAI revolution with the release of ChatGPT in 2022, is planning its own productivity offering. And Perplexity is rethinking browsers, envisioning browsing apps that include e-mail composition and other productivity features.
“OpenAI is increasingly seeing itself as a productivity tool, and that would include the need to address actual creation tools like Office tools does,” said Gold.
Why the rush to add genAI seemingly everywhere? Because doing so adds a level of intelligence that can accelerate enterprise productivity not possible at a human scale, corporate execs said.
“Your strategy is delivered by and enhanced through AI,” said Zachary Hanif, head of AI, machine learning, and data at Twilio. “AI itself is not the fundamental strategy.”
Twilio, a cloud-based customer engagement company founded in 2008, has a history of tearing down products to evolve its offerings. It started off focused on SMS and email communication but is now looking at multimodal forms of communication with AI.
“The benefit of those transitions is that you develop a lot of muscle memory for how to be able to change and adapt as the world changes and adapts around you,” Hanif said. He characterized genAI technology as delivering added context and speed — the “right message, right time, right context.”
Taking a different tack, Slack, which is part of Salesforce, converted its popular communications and messaging platform into what Chief Product officer Rob Seaman called a “work operating system.”
The company looked for problems AI could solve within the Slack interface and is acting on what it found, Seaman said. For example, digital labor tools inside Slack can orchestrate communication and processes and newer features offer enterprise search, summaries, meeting notes, and translations.
“Can they be materially better because they’re in Slack? If not, we’re just wasting time trying to recreate or reinvent the wheel,” Seaman said.
At Zoom, AI features are embedded in the company’s videoconferencing software, not bolted on; the goal is to deliver real value to users, said Kim Storin, chief marketing officer at Zoom.
“It’s truly part of the overall workflow, versus just a side project of AI,” Storin said, adding, “What we’re seeing a lot in the market right now is AI washing.”
Like Slack, Zoom is adding AI agents to automate online and offline tasks. (Both companies help customers discover agents through search, directories and galleries.)
Even with the push to infuse AI in software, tech vendors and buyers alike face universal challenges, analysts said.
enAI
While AI is indeed changing business, software vendors are rushing out new features without real insights from their buyers, said Craig LeClair, vice president and principal analyst at Forrester Research. “It’s kind of like the traditional process methodologies are going to be blown up by this. And there’s nothing that’s jumping out there…to replace it,” LeClair said.
Agents are being designed as co-workers to humans, but measuring their productivity remains an open question. And some workers might resist AI if cultural changes aren’t put in place.
“It’s going to go from human in the loop to human on the loop,” LeClair said. “There needs to be monitoring to attribute accountability to people to manage these agents.”
Trusting newer frameworks and models to interact with older systems is also a concern, LeClair said. “They’re worried about explainability issues, they’re worried about security and data leakage and prompt injections,” he said.
Relying completely on AI and computers to make critical decisions could hurt companies if guardrails aren’t in place, said Bob Parker, senior vice president at IDC.
“You’re introducing some reasoning into some decision making that the AI is able to do and you can’t always predict the outcome,” he said.
Source:: Computer World
Microsoft has issued fixes for a pair of troublesome bugs introduced with its August 2025 Patch Tuesday cumulative security updates.
The updates — KB5063875, KB5063709, and KB5063877 — not only triggered installation errors that blocked some Windows 11 devices from upgrading, but also broke reset and recovery tools across both Windows 11 and Windows 10. The problems affected Windows 11 (22H2 and 23H2) and, in the case of reset and recovery failures, Windows 10 version 22H2 as well.
Source:: Computer World
By Deepti Pathak Pie charts are perhaps the most common data visualisation tool, especially when illustrating comparisons or percentages….
The post How To Make a Pie Chart in Google Sheets (2025) appeared first on Fossbytes.
Source:: Fossbytes
Click Here to View the Upcoming Event Calendar