Garena Free Fire Max Redeem Codes for August 23

Home » Archive by Category "Technology" (Page 83)

Microsoft Intune explained: A leader in unified endpoint management

Home » Archive by Category "Technology" (Page 83)

In today’s multi-device, work-from-anywhere world, unified endpoint management (UEM) is crucial for efficiency and security, providing a “single pane of glass” for managing mobile, desktop, and cloud environments. Microsoft Intune is a leading example of a UEM product that has continuously expanded to meet IT’s evolving needs.  

What is Microsoft Intune?

Microsoft Intune is a suite of management tools that are the core of Microsoft’s UEM strategy as well as part of Microsoft 365’s broader technology stack. The company’s goal is to simplify managing mobile devices and applications, PCs, and other devices — and to reduce complexity and cost for IT teams.

For example, Intune’s mobile device management (MDM) capabilities are built to allow IT administrators to enforce security policies, remotely wipe devices, and manage configurations across heterogeneous platforms. Its mobile application management (MAM) features are designed to help businesses manage applications on both corporate and personal devices — enabling deployment, updates, and retirement of applications — and to protect corporate data within apps, preventing data leaks without disrupting user experience. (Download our 2025 UEM vendor comparison chart for a comprehensive list of capabilities in Intune and its main competitors.)

Today, Intune leverages artificial intelligence (AI) and automation to enhance UEM security, improve end-user experience, and simplify operations.

Intune through the years

If you’re having a hard time keeping track of Microsoft’s UEM strategy, you’re not alone. What began as Windows Intune in 2010 evolved — and survived an identity crisis — to land where it is today as arguably the leader in the UEM market.

When Intune first arrived, companies were still in the throes of figuring out how to manage the sudden onslaught of devices accessing corporate data and networks — fallout from the bring-your-own-device (BYOD) trend that took off after the release of Apple’s iPhone in 2007.

To address the emerging enterprise mobility management (EMM) needs of businesses, Microsoft launched its Intune cloud service in 2010 and added numerous mobile management features in subsequent years. In 2019, Microsoft decided to combine its Intune UEM platform with its longstanding Configuration Manager (ConfigMgr) on-premises management platform, enabling users to access both through a single interface and rebranding the combined service as Microsoft Endpoint Manager. A few years later, in 2022, the service was rebranded back to Microsoft Intune, and the next year Microsoft released the Intune Suite, which consolidated its endpoint management and security solutions to streamline protection for both cloud and on-premises endpoints. 

The timeline below shows the many self-imposed twists and turns of Microsoft Intune.

How Windows Intune became Microsoft Intune, then became Microsoft Endpoint Manager, and then became Microoft Intune again.Foundry

Why Intune is a UEM leader

Microsoft’s UEM strategy revolves around simplifying management with a cloud-first approach and reducing complexity and cost for IT teams by leveraging AI and automation to enhance endpoint security, improve end-user experience, and simplify operations. This jibes with Gartner’s forecast for the UEM market. The research firm predicts that by 2029, more than 50% of organizations will adopt autonomous endpoint management (AEM) capabilities within advanced endpoint management and digital employee experience (DEX).

Driven by corporate mobile device programs, hardware management has been shifting away from a Windows-dominant world to one that is increasingly diverse and includes iOS, Android, and macOS devices. As more worker tasks are carried out on mobile devices, the momentum behind UEM, and its capability to manage all user-facing devices from a single console, continues to grow.

While it’s a competitive market, Microsoft is widely recognized by experts and analysts such as IDC and Gartner as a leader in the UEM sector. According to IDC’s 2024 MarketScape for Worldwide UEM Software report, Microsoft is a leader in the category. The research firm notes that an important trend in UEM is the need account for “unmanaged” devices, specifically through mobile application management (MAM) features that secure corporate data and apps without full device enrollment.

Intune’s integration with other Microsoft services is an advantage it has over competitors. For example, it’s designed to work seamlessly with Azure Active Directory.

Microsoft Intune is designed to allow you to manage your organization’s devices and supports Android, Android Open Source Project (AOSP), iOS/iPadOS, Linux Ubuntu Desktop, macOS, ChromeOS, and Windows client devices.Microsoft

How to get Microsoft Intune and what you’ll pay for it

Microsoft Intune is a standalone product, but it is also included with certain Microsoft 365 plans. While Basic Mobility and Security is part of the Microsoft 365 plans, it’s a separate, free feature set and is not a full version of Intune. The following versions of Microsoft 365 include the complete version of Intune:

Microsoft 365 Business Premium 

Microsoft 365 Firstline 3          

Microsoft 365 Enterprise E3                 

Microsoft 365 Enterprise E5                 

Microsoft 365 Education A1                 

Microsoft 365 Education A3                 

Microsoft 365 Education A5                 

Enterprise Mobility & Security E3       

Enterprise Mobility & Security E5 

As a subscription service, Microsoft charges companies on a per user/per month basis in three tiers, which can also be purchased as standalone licenses or in bundles with other Microsoft products. The most common pricing is based on a per-user, per-month model with an annual commitment and breaks down as follows:

Microsoft Intune Plan 1: This core plan includes essential endpoint and application management features. It costs $8 per user per month.

Microsoft Intune Plan 2: This is an add-on to Plan 1, providing advanced capabilities. It costs $4 per user per month.

Microsoft Intune Suite: Bundles all features from Plan 1 and Plan 2, along with additional advanced security and management solutions. It costs $10 per user per month as an add-on to Plan 1.

Additional information on Intune pricing

Add-ons: Advanced features such as Remote Help, Endpoint Privilege Management, and Endpoint Analytics can also be purchased as individual add-ons.

Free Trial: Microsoft offers a 30-day free trial with 100 user licenses, allowing organizations to test the service before committing to a purchase.

Device-only licenses: There are also device-only subscriptions available for specific use cases like kiosks or shared devices that are not tied to a particular user.

Looking ahead: Intune in development

What’s next for Intune? According to Microsoft, these features are currently in development for Intune and will likely be available in 2025:

Microsoft Intune Suite: A new dashboard for endpoint privilege management (EPM) is in design and will provide insights into user status and file elevation trends. EPM will also support Azure Virtual Desktop single-session virtual machines.

App management: Intune app protection policies for Apple’s  iOS/iPadOS will allow blocking data sync from policy-managed app data to app widgets, enhancing data protection, according to Microsoft.

Device management: New Microsoft Graph permissions for API calls to device management endpoints will require updates to tools and scripts should be available in August. Remote wipe actions will support multiple administrative approvals. Intune Device control policy will support devices managed by Microsoft Defender for Endpoint.

Monitoring and troubleshooting: Improved declarative Apple software update reports will offer near real-time details on update failures, pending updates, and installation status.

Significant Intune notices

Updates to the latest Intune App SDK and App Wrapping Tool for iOS will be required to support iOS/iPadOS 26 and ensure continued app protection policy enforcement. Apps will need to be registered with Microsoft Entra.

Intune will move to support iOS/iPadOS 17 and later, and Android 10 and later for user-based management methods, with Microsoft expected to drop support for older OS versions.

Updates are coming for strong mapping for SCEP and PKCS certificates to address elevation of privilege vulnerabilities.

New standalone settings for blocking screen capture, Genmojis, and Writing tools in Apple Intelligence will be introduced.

7 keys to UEM success
>To be successful, any comprehensive UEM system needs to integrate with client management tools and meet the following objectives, according to Gartner:

>
Provide a single console to configure, manage, and monitor traditional mobile devices, PCs, and device management of IoT assets.
Unify the application of data protection, device configuration, and usage policies.
Provide a single view of multi-device users for better end-user support and to gather detailed workplace analytics.
Act as a coordination point to orchestrate the activities of related endpoint technologies such as identity services and security infrastructure.
Use AI and machine learning to automate tasks, proactively fix issues, and reduce the need for human intervention.
Be tightly integrated with digital employee experience (DEX) tools. This involves monitoring and analyzing telemetry from endpoints, apps, and networks to measure and improve the user experience
Integrate with endpoint security platforms (EPP) and endpoint detection and response (EDR).

This article was originally launched in September 2018 and most recently updated in August 2025.

Related reading:

What is UEM? Unified endpoint management explained

UEM buyer’s guide: How to choose the right unified endpoint management platform

Download our UEM vendors comparison chart

Source:: Computer World

Apple has protected against seven zero-day attacks this year

Home » Archive by Category "Technology" (Page 83)

Apple is seeing rapid growth in enterprise markets, and in the wake of the Crowdstrike disaster and Microsoft’s forced Windows 11 upgrades, there’s no good reason for that trend to end. It’s no wonder its platforms have become such a big target for organized crime — meaning constant security vigilance is necessary for every user as the scale of attacks intensifies.

That doesn’t mean Apple’s products are insecure; they’re not. But no platform is completely secure, and as more enterprise data is held on those platforms it becomes increasingly essential to ensure you have the correct security stance in place.

How much is too much?

Apple’s highly-skilled security teams are the first line of platform defense to protect system integrity, and they know how constant the attempts against its platforms have become. We don’t know how constant, but only this week we’ve heard of two relatively serious security warnings, including the seventh zero-day attack this year.

CrowdStrike (remember it?) recently warned of a spike in exploits targeting Macs on the part of a bunch of cybercriminals known as Cookie Spider. These attacks use malware infested advertising to trick people into visiting fraudulent help websites where they are fooled into executing malicious commands that steal their data.

The second, perhaps more disturbing, zero-day exploit is one that has been actively exploited in “extremely sophisticated” attacks against “specific targeted individuals.” That strongly suggests it to have been used in a sophisticated spyware campaign. Known as CVE-2025-43300, it enables attackers to compromise Apple device security just by getting the user to open a malicious image file. How severe is this exploit? Very. The Cybersecurity and Infrastructure Security Agency (CISA) has given this vulnerability a severity rating of 8.8 out of 10.

One reason the latter attack exploits malicious images is because Apple has made it much harder to use more conventional link-based attacks. These barriers are far from being complete — Apple has now patched a total of seven zero-day attacks this year — and it’s only August.

In discussing this, Adam Boynton, senior security strategy manager at Jamf, suggested the zero-day attack might have been used by one of the surveillance mercenaries. “While Apple has not confirmed whether this specific flaw was linked to spyware, similar vulnerabilities in ImageIO and WebKit have previously been used in Pegasus campaigns,” he said. 

Surveillance-as-a-service

Pegasus is just one of a hungry horde of amoral, zero-day spyware attacks to be sold for profit by surveillance-as-a-service firms, many of which seem to emanate from Israel.

“This is a zero-click exploit that requires no user interaction, and can be triggered simply by processing a maliciously crafted image file, which could be delivered through various channels including messages, emails, or web content,” according to Qualys security research manager Mayuresh Dani.

Developing such attacks is very costly, which suggests the level of resources being thrown into breaking Apple device security. (It’s worth noting that these are the kinds of resources that would also be used to identify and exploit any security backdoors put in place at an operating system level in the event authoritarian surveillance-loving governments get their way.)

That cost certainly doesn’t seem to be a massive turn-off to the highly sophisticated and well-resourced companies profiting from the delivery of digital chaos. Many of these firms, such as NSO Group, have faced international sanctions and lawsuits, which doesn’t seem to have stopped them at all. Meanwhile, many of the exploits they create are sold to repressive governments that use them against journalists, dissidents, political rivals and others. Beyond that, older, patched exploits have reportedly been traded on the dark web, meaning these dangerous attacks can proliferate.

The danger of such attacks should be top of mind for any prominent business executive, as enterprises can be targets, too — particularly as corporate execs jet around the world. Travelers should now carry burner phones with only limited access to important corporate (or personal) data.

Don’t be paranoid, but be aware

The growing sophistication and frequency of attacks reflect Apple’s growing ecosystem but underline the obvious need to maintain a robust security posture. That includes keeping all your devices updated with the latest security patches and ensuring that all the systems you do use are running — or capable of running — the latest security updates.

While Apple is evolving, attackers are evolving in tandem. Are all your systems updated with the latest security patches? 

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Source:: Computer World

Today’s Octordle #1306 Hints & Answers for August 22, 2025

Home » Archive by Category "Technology" (Page 83)

HP Omen 16 With AMD/Intel Chips & RTX 5070 Ti Launched in India

Home » Archive by Category "Technology" (Page 83)

European space tech has data to sell — but where are the buyers?

Home » Archive by Category "Technology" (Page 83)

By Ray Fernandez The European space industry is booming. Yet despite the boom, the industry is struggling to find commercial buyers for arguably its most valuable output: data.  At the Living Planet Symposium 2025 in Vienna, the European Space Agency (ESA) and private sector leaders laid out Europe’s bold space ambitions and called for increased cooperation to address deep commercial gaps. Josef Aschbacher, ESA’s director general, highlighted one key focus. “Earth observation within the European Space Agency is a major priority,” he said. ESA has had recent successful missions. Its miniature satellite Φsat-2, for example, has started transmitting high-definition images back to Earth…This story continues at The Next Web

Source:: The Next Web

Google rolls out new AI content-generation and consumption tools in Workspace

Home » Archive by Category "Technology" (Page 83)

Google this week released significant AI-powered content generation and consumption updates to its Workspace productivity suite.

The company said it has expanded the availability of its Whisk image-generation model to Google AI Ultra for Business customers in 77 countries. Whisk generates new images by referencing uploaded images and text descriptions in a prompt. 

Pricing for the Google AI Ultra Workspace starts at $249.99 per month, but varies  depending on the features selected.

Google is also doubling the number of images and videos generated by Whisk and the video generation model Flow for its Google AI Ultra for Business customers. The number of credits has doubled to 25,000, the company said in a recent blog post.

Google also added a tool that can create audio versions of documents in Google Docs. A “Listen” menu item allows for the creation of the audio documents, letting users listen to them in a podcast-like format. That, Google suggested, could help in catching written errors. 

“You also have the option to customize your audio experience with a variety of voices and playback speeds to match your personal preferences,” Google explained in a blog post.

The audio option was likely adapted from Google’s NotebookLM AI tool, which creates audio summaries of long documents.

Another new feature in Google Chat will summarize unread messages in chats and private channels, saving users from having jump between windows to catch up.

Google is also previewing interface updates in Google Meet focused on hardware controllers. These changes include single-click buttons for hardware controls such as mute and hand-raise, so users can “concentrate on their meetings rather than searching for controls,” the company said.

The UI preview for Meet is being rolled out for system administrators to test before its general availability in approximately six weeks. Admins will need to activate the feature for individual users. 

That follows changes  Google made last month to the timeline and way it rolls out beta features. System administrators can control when and who can try out beta features in Workspace before general availability. 

Source:: Computer World

4 Ways To Check Apple Store Gift Card Balance (2025)

Home » Archive by Category "Technology" (Page 83)

Peroxide Trello & Discord Link (2025)

Home » Archive by Category "Technology" (Page 83)

Swedish startup unveils Starlink alternative — that Musk can’t switch off

Home » Archive by Category "Technology" (Page 83)

By Thomas Macaulay A new pocket-sized Starlink alternative promises secure military communications — safe from interference by billionaire CEOs. The system, named the RU1, was unveiled today by Swedish startup TERASi. It’s billed as the world’s smallest and lightest mm-Wave radio, a form of communications that offers blazing-fast speeds and huge bandwidth. James Campion, the CEO and co-founder of TERASi, describes the portable device as “the GoPro of backhaul radios.” “RU1 can be deployed in minutes to keep units connected in fast-changing environments,” Campion told TNW. The devices, he continued, can be installed on tripods or drones. Multiple RU1s can then link into…This story continues at The Next Web

Source:: The Next Web

Productivity software firms pivot to genAI by leaning on legacy strengths

Home » Archive by Category "Technology" (Page 83)

A recent survey by MIT found that 95% of generative AI (genAI) projects failed to have a meaningful financial impact. But for companies making productivity tools, adopting the technology has become a matter of survival.

Everyone from big-name companies like Microsoft and Google to others like Zoom, Slack and Twilio, shifted gears (and business practices) in recent years to make seemingly overnight changes to their wares, plugging in AI and adding agents atop well-laid workflows and legacy business models.

Now, those genAI tools are widely used to make their products easier to use, with AI helpers providing new insights by analyzing old data that until now lay siloed and dormant.

Microsoft and Google are respectively adding Copilot and Gemini features to their productivity suites at a quickening pace. It’s a matter of survival that “will depend on how quickly companies adopt AI tools as a new way of doing things, and how quickly their customers adopt the new services,” said Jack Gold, principal analyst at J. Gold Associates.

Other companies have taken note: OpenAI, which spurred the genAI revolution with the release of ChatGPT in 2022, is planning its own productivity offering. And Perplexity is rethinking browsers, envisioning browsing apps that include e-mail composition and other productivity features.

“OpenAI is increasingly seeing itself as a productivity tool, and that would include the need to address actual creation tools like Office tools does,” said Gold.

Why the rush to add genAI seemingly everywhere? Because doing so adds a level of intelligence that can accelerate enterprise productivity not possible at a human scale, corporate execs said.

“Your strategy is delivered by and enhanced through AI,” said Zachary Hanif, head of AI, machine learning, and data at Twilio. “AI itself is not the fundamental strategy.”

Twilio, a cloud-based customer engagement company founded in 2008, has a history of tearing down products to evolve its offerings. It started off focused on SMS and email communication but is now looking at multimodal forms of communication with AI.

“The benefit of those transitions is that you develop a lot of muscle memory for how to be able to change and adapt as the world changes and adapts around you,” Hanif said. He characterized genAI technology as delivering added context and speed — the “right message, right time, right context.” 

Taking a different tack, Slack, which is part of Salesforce, converted its popular communications and messaging platform into what Chief Product officer Rob Seaman called a “work operating system.”

The company looked for problems AI could solve within the Slack interface and is acting on what it found, Seaman said. For example, digital labor tools inside Slack can orchestrate communication and processes and newer features offer enterprise search, summaries, meeting notes, and translations.

“Can they be materially better because they’re in Slack? If not, we’re just wasting time trying to recreate or reinvent the wheel,” Seaman said.

At Zoom, AI features are embedded in the company’s videoconferencing software, not bolted on; the goal is to deliver real value to users, said Kim Storin, chief marketing officer at Zoom.

“It’s truly part of the overall workflow, versus just a side project of AI,” Storin said, adding, “What we’re seeing a lot in the market right now is AI washing.”

Like Slack, Zoom is adding AI agents to automate online and offline tasks. (Both companies help customers discover agents through search, directories and galleries.)

Even with the push to infuse AI in software, tech vendors and buyers alike face universal challenges, analysts said.

enAI

While AI is indeed changing business, software vendors are rushing out new features without real insights from their buyers, said Craig LeClair, vice president and principal analyst at Forrester Research. “It’s kind of like the traditional process methodologies are going to be blown up by this. And there’s nothing that’s jumping out there…to replace it,” LeClair said.

Agents are being designed as co-workers to humans, but measuring their productivity remains an open question. And some workers might resist AI if cultural changes aren’t put in place.

“It’s going to go from human in the loop to human on the loop,” LeClair said. “There needs to be monitoring to attribute accountability to people to manage these agents.”

Trusting newer frameworks and models to interact with older systems is also a concern, LeClair said. “They’re worried about explainability issues, they’re worried about security and data leakage and prompt injections,” he said.

Relying completely on AI and computers to make critical decisions could hurt companies if guardrails aren’t in place, said Bob Parker, senior vice president at IDC.

“You’re introducing some reasoning into some decision making that the AI is able to do and you can’t always predict the outcome,” he said.

Source:: Computer World

Microsoft fixes the fixes that broke Windows tools

Home » Archive by Category "Technology" (Page 83)

Microsoft has issued fixes for a pair of troublesome bugs introduced with its August 2025 Patch Tuesday cumulative security updates.

The updates — KB5063875, KB5063709, and KB5063877 — not only triggered installation errors that blocked some Windows 11 devices from upgrading, but also broke reset and recovery tools across both Windows 11 and Windows 10. The problems affected Windows 11 (22H2 and 23H2) and, in the case of reset and recovery failures, Windows 10 version 22H2 as well.

Source:: Computer World

How To Make a Pie Chart in Google Sheets (2025)

Home » Archive by Category "Technology" (Page 83)

The next unicorn might not hire anyone

Home » Archive by Category "Technology" (Page 83)

By Megan Carnegie A decade ago, startups often equated success with rapid headcount growth. The formula was simple: build a product, raise a round, hire fast. Bigger teams meant bigger bets. But the rulebook is getting rewritten as a new generation of startups scales with leaner teams and fewer people. They’re not building out sprawling customer support or sales teams, and seem to be automating what once warranted entire departments. Their growth is quite remarkable. Cursor, which became the fastest-growing SaaS company in history, generated $200mn in revenue with 30 employees. Midjourney made $200mnn with 40. Ben Lang’s site Tiny Teams tracks these…This story continues at The Next Web

Source:: The Next Web

AI in the classroom is important for real-world skills, college professors say

Home » Archive by Category "Technology" (Page 83)

Will the use of generative AI (genAI) tools degrade human intelligence over the long term?

That question — and lingering concerns about cheating and hallucinations — are among the issues US university professors are grappling with as a new academic year approaches. Even as some embrace the technology, others look askance at generative AI tools.

But because of how quickly it’s been adopted in the business world, completely shutting out AI in classrooms could hamper students’ professional development, several professors told Computerworld.

“If integrated well, AI in the classroom can strengthen the fit between what students learn and what students will see in the workforce and world around them,” argued Victor Lee, associate professor at Stanford’s Graduate School of Education.

GenAI companies are certainly doing their part to lure students into using their tools by offering new learning and essay-writing features. Google has gone so far as to offer Gemini free for one year, and OpenAI late last month introduced “Study Mode” to help students “work through problems step by step instead of just getting an answer,” the company said in a blog post.

Selecting the “study mode” in ChatGPT details how the genAI tool reaches an answer to a query. Google has a similar experimental tool called “Learn About” and a tool called NotebookLM, which recently got a host of new genAI features.

Grammarly has also introduced new genAI tools to help students with assignments. The AI Grader agent “looks at your assignment rubric and gives you suggestions like your professor would, and a grade prediction before you submit your work,” Grammarly CEO Shishir Mehrotra explained in a LinkedIn entry.  The agents work in existing user interfaces; users don’t need to cut and paste or type in prompts.

The agents can flag unsupported claims in students’ writing and explain why evidence is needed and recommend the use of credible sources, Luke Behnke, vice president of product management at Grammarly, said in an interview. “Colleges recognize it’s their responsibility to prepare students for the workforce, and that now includes AI literacy,”  Behnke said.

Universities are also implementing AI in their own learning management systems and providing students and staff access to Google’s Gemini, Microsoft’s Copilot and OpenAI’s ChatGPT. 

For example, Duke University in North Carolina provides all staff and students free access to OpenAI’s GPT-5, including the mathematics and coding tools. “University offices that work on enhancing teaching and learning quality are working really hard to guide faculty on ways to use AI,” Lee said.

Longji Cuo, an associate professor at the University of Colorado, in Boulder, teaches a course on AI and machine learning to help mechanical engineering students learn to use the technology to solve real-world engineering problems. 

Cuo encourages students to use AI as an agent to help with teamwork, projects, coding, and presentations in class. “My expectation on the quality of the work is much higher,” Cuo said, adding that students need to “demonstrate creativity on the level of a senior-level doctoral student or equivalent.”

Cuo asks students not to simply accept whatever results advanced genAI models spit out, as they may be riddled with factual errors and hallucinations. “Students need to select and read more by themselves to create something that people don’t recognize as an AI product,” Cuo said.

Some professors are trying to mitigate AI use by altering coursework and assignments, while others prefer not to use it at all, said Paul Shovlin, an assistant professor of AI and digital rhetoric at Ohio University.

But students have different requirements and use AI tools for personalized learning, collaboration, and writing, as well as for coursework workflow, Shovlin said. He stressed, however, that ethical considerations, rhetorical awareness, and transparency remain important in demonstrating appropriate use.

“GenAI isn’t a light switch that is flipped on or off,” he said. “GenAI has consolidated a lot of capabilities in one site.”

Shovlin’s new media composition course uses genAI as a tool to build assets and complement skillsets needed for student multimedia projects. “This means students can focus on the larger assignment and not sweat some basic building blocks that aren’t the basis for the class,” he said.

For example, in the graphic novel assignment, Shovlin demonstrates how image creation tools can create assets that can be integrated into graphic design in a collage-like manner. 

“Drawing is not a learning outcome for the class, but successfully engaging in a substantial multimedia composition is …,” he said.

GenAI can be useful in the classroom as long as a student is learning, asking critical questions, and developing skills, said Jack Gold, principal analyst at J. Gold Associates. “It is very helpful if you know the right questions to ask and if you find a competent AI model that knows about your subject matter,” Gold said.

But lazy students who rely on genAI tools to write papers are only undermining their skills development, he said.

Gold predicted that one day, AI agents will be able to work with students on their personalized education needs. “Rather than having one teacher for 30 students, you’ll have one AI agent personalized to each student that will guide them along.”

Source:: Computer World

MIT study: 95% of corporate genAI projects fall short of success

Home » Archive by Category "Technology" (Page 83)

US companies have invested between $35 billion and $40 billion in generative AI (genAI) projects, but most efforts are stuck in the pilot stage, according to a report from MIT’s NANDA initiative. Only about 5% of the efforts lead to rapid revenue growth; the majority produce little or no impact, Fortune reports.

The core problem is apparently not the quality of the models being used, but a lack of integration, learning and alignment with corporate workflows. Companies often invest in sales and marketing solutions, but the biggest returns seem to be in back-office automation and streamlining internal processes.

The report also found that successful companies tend to buy specialized solutions and build partnerships, while in-house development projects fail significantly more often.

Source:: Computer World

BGMI Redeem Codes For August 19

Home » Archive by Category "Technology" (Page 83)

7 Ways To Fix Apple Watch Battery Draining Fast (2025)

Home » Archive by Category "Technology" (Page 83)

Is ChatGPT really making us dumb and lazy?

Home » Archive by Category "Technology" (Page 83)

By Andrea Hak Since ChatGPT’s debut in 2022, generative AI quickly entered our work, study, and personal lives, helping to speed up research, content creation, and more at an unprecedented rate. Enthusiasm for generative AI tools has understandably gained traction experiencing an even faster adoption rate than the Internet or PCs, but experts warn we should proceed with caution. As with every new technology, generative AI can launch society forward in a number of ways, but it can also bring consequences if left unchecked. One of those voices is Natasha Govender-Ropert, Head of AI for Financial Crimes at Rabobank. She joined TNW founder…This story continues at The Next Web

Source:: The Next Web

Anthropic’s Claude models can now shut down harmful conversations

Home » Archive by Category "Technology" (Page 83)

Anthropic has introduced a new feature in its Claude Opus 4 and 4.1 models that allows the generative AI (genAI) tool to end a conversation on its own if a user repeatedly tries to push harmful or illegal content.

The new behavior is supposed to only be used when all attempts to redirect a conversation have failed or when a user asks for the conversation to be terminated. It is not designed to be activated in situations where people risk harming themselves or others. Users can still start new conversations or continue a previous one by editing their replies.

The purpose of the feature is not to protect users; it’s to the model itself. While Anthropic emphasizes it does not consider Claude to be sentient, tests found the model showed strong resistance and “apparent discomfort” to certain types of requests. So, the company is now testing measures for better “AI wellness” — in case that becomes relevant in the future.

Source:: Computer World

REGISTER NOW FOR YOUR PASS
 
To ensure attendees get the full benefit of an intimate technology expo,
we are only offering a limited number of passes.
 
Get My Pass Now!