API

Interview: Sacha Vaughan, chief supply chain officer, Joseph Joseph

Sacha Vaughan, chief supply chain officer at houseware manufacturer Joseph Joseph, is in a fortunate position – her board recognises the critical role of the supply chain in a digital age, which she suggests isn’t always the case. “Many brands see the supply chain as simply moving boxes from one place to another,” she says.…

Interview: Sacha Vaughan, chief supply chain officer, Joseph Joseph Read More »

Tinker Is Thinking Machines Lab’s First AI Product, But It’s Not The ChatGPT Rival Some Expected

Kimberly White/Getty Images There’s been a lot of excitement about Mira Murati’s Thinking Machines Lab (TML) AI startup ever since the former high-ranking OpenAI executive left the company that created the ChatGPT chatbot and spawned the current AI revolution. A year later, Murati’s AI firm is ready to release its first, highly anticipated AI product. …

Tinker Is Thinking Machines Lab’s First AI Product, But It’s Not The ChatGPT Rival Some Expected Read More »

ChatGPT: Everything you need to know

Since its public debut in 2022, ChatGPT has swiftly reshaped the technological landscape and global economy. As the first widely accessible artificial intelligence (AI) tool to deliver near-human cognitive performance (from holding conversations and drafting emails to coding and conducting complex research), it has captured the attention of the general public and the business world.…

ChatGPT: Everything you need to know Read More »

Warlock claims more victims as cyber attacks hit Colt and Orange

Warlock, the emergent cyber crime gang that claims it is holding UK network and telecoms services provider Colt’s data to ransom, appears to have hit multiple other victims in the past few weeks, it has emerged. This is according to data supplied through the open source RansomLook.io information service, which is currently tracking 475 ransomware…

Warlock claims more victims as cyber attacks hit Colt and Orange Read More »

Commvault users told to patch two RCE exploit chains

Data backup and replication specialist Commvault has issued patches covering off four vulnerabilities in its core software product that, left unaddressed, could be combined to achieve two distinct remote code execution (RCE) exploit chains. The four issues were discovered by WatchTowr vulnerability researchers who were probing Commvault’s software after having stumbled upon another RCE flaw…

Commvault users told to patch two RCE exploit chains Read More »

Anthropic Will Train Claude On Your Chats – Here’s How To Opt Out

gguy/Shutterstock Anthropic on Thursday announced plans to collect Claude chat data to train future versions of the AI chatbot, giving users the ability to choose whether to have their chats included in that training data. That’s the usual behavior for generative AI products like ChatGPT and Gemini. The chatbots are trained on lots of data…

Anthropic Will Train Claude On Your Chats – Here’s How To Opt Out Read More »

Warlock claims ransomware attack on network services firm Colt

London-headquartered telecoms and network services company Colt is attempting to bring various customer-facing services back online after being hit by a cyber attack claimed by the Warlock ransomware gang. The incident, which the firm at first chalked up to a technical issue, appears to have started on Tuesday 12 August at around 11am BST, when…

Warlock claims ransomware attack on network services firm Colt Read More »

Interview: Differentiating with AI in pet care

Over the past year, Kate Balingit has been leading the digital health initiative at Mars Pet Nutrition, reporting to the company’s Petcare chief information officer, where she is focused on commercialising and deploying artificial intelligence (AI) through the Mars pet nutrition brands. These include well-known pet foods brands such as Pedigree, Iams, Sheba and Whiskas.…

Interview: Differentiating with AI in pet care Read More »

Attacker could defeat Dell firmware flaws with a vegetable

Over 100 models of Dell laptop PCs across the enterprise-centric Latitude and Precision ranges, and many thousands of individual devices, are at risk of compromise through a series of five common vulnerabilities and exposures (CVEs) that affect their security firmware and associated Microsoft Windows application programming interfaces (APIs), according to a disclosure from the Cisco…

Attacker could defeat Dell firmware flaws with a vegetable Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top