Remove Authentication Remove Hardware Remove Linux Remove VR
article thumbnail

Radar Trends to Watch: June 2023

O'Reilly Media - Ideas

By the time you read this, Apple may have announced their ultra-expensive, ultra-stylish AR headset; that may be enough to break the Metaverse out of its AR/VR winter. MLC LLM , from developers of Web LLM , allows many different combinations of hardware and operating systems to run small large language models entirely locally.

article thumbnail

Radar trends to watch: August 2021

O'Reilly Media - Ideas

Good practices for authentication, backups, and software updates are the best defense against ransomware and many other attacks. To succeed, VR will have to get beyond ultra geeky goggles. Mark Zuckerberg has been talking up the Metaverse as the next stage in the Internet’s evolution: a replacement for the Web as an AR/VR world.

Trends 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Radar trends to watch: September 2021

O'Reilly Media - Ideas

GitHub is now requiring 2-factor authentication , preferably using WebAuthn or Yubikey. Amazon will be giving free USB authentication keys to some customers (root account owners spending over $100/month). Facebook’s Time cards are an open-source (code and hardware) solution for accurate time keeping. Miscellaneous.

Trends 124
article thumbnail

Technology Trends for 2023

O'Reilly Media - Ideas

That’s a fairly good picture of our core audience’s interests: solidly technical, focused on software rather than hardware, but with a significant stake in business topics. The topics that saw the greatest growth were business (30%), design (23%), data (20%), security (20%), and hardware (19%)—all in the neighborhood of 20% growth.

Trends 136
article thumbnail

Radar Trends to Watch: June 2022

O'Reilly Media - Ideas

NVIDIA has open-sourced its Linux device drivers. The Passkey standard, supported by Google, Apple, and Microsoft, replaces passwords with other forms of authentication. An application makes an authentication request to the device, which can then respond using any authentication method it supports. VR/AR/Metaverse.

article thumbnail

Radar trends to watch: May 2022

O'Reilly Media - Ideas

It’s probably a better experience in VR. Google has published Little Signals , six experiments with ambient notifications that includes code, electronics, and 3D models for hardware. Ransomware attacks have been seen that target Jupyter Notebooks on notebook servers where authentication has been disabled.

article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

It’s now used in operating systems (Linux kernel components), tool development, and even enterprise software. We’ve said in the past that Linux is table stakes for a job in IT. Usage dropped 5%, although a 10% increase for Kali Linux (an important tool for penetration testers) largely offsets that decline. We also saw 9.8%

Trends 118