Monthly Archives: February 2024

Google adds Gemini in workspace, drops hints for education variant

Today, Google announced the official integration of its advanced AI model, Gemini, into Google Workspace. Previously known as Duet AI, Gemini offers enhanced capabilities and features designed to empower businesses of all sizes. Here is what’s new: Gemini can automate mundane tasks and improve team members’ communication, increasing productivity and collaboration. Additionally, it provides access to […]

Microsoft to use Intel 18A process node to manufacture its own chip

 At Intel’s first foundry event, Intel Foundry Direct Connect, Microsoft CEO Satya Nadella confirmed that Microsoft will be using Intel’s upcoming 18A process to manufacture one of its own chip design. The Intel 18A process offers the foundry industry’s first backside power solution. This innovative design optimizes power distribution, resulting in potential performance and efficiency gains. Intel […]

Microsoft to use Intel’s 18A process node to manufacture its own chip

 At Intel’s first foundry event, Intel Foundry Direct Connect, Microsoft CEO Satya Nadella confirmed that Microsoft will be using Intel’s upcoming 18A process to manufacture one of its own chip design. The Intel 18A process offers the foundry industry’s first backside power solution. This innovative design optimizes power distribution, resulting in potential performance and efficiency gains. Intel […]

Look away Android users, Apple iMessage gets more secure than ever: can withstand quantum computer attacks

Apple announced the introduction of PQ3, a new cryptographic protocol designed to strengthen the security of iMessage communication. PQ3 stands for “Post-Quantum Level 3” and aims to address potential vulnerabilities arising from future advancements in quantum computing. PQ3 incorporates post-quantum algorithms alongside classical cryptography, protecting against potential attacks even if quantum computers become powerful enough to break […]

New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following […]