We are at a tipping point for quantum computing, which is on the verge of becoming a reality. While its potential is tantalizing, it also represents an unprecedented threat to the traditional data security infrastructure and the cryptographic algorithms that protect it. Post-quantum cryptography – algorithms designed to be secure against classical and quantum computer attacks – is the response.
Quantum computers exploit the principles of quantum mechanics to solve complex problems that classic computers cannot feasibly tackle. Quantum computers use the principles of quantum mechanics to process information in a way that uses qubits, which can exist in multiple states, as opposed to normal computers, which only use "zeros" and "ones". This creates an exponential scale, which is what gives them their computational power.
Of particular concern is their ability to crack widely used public key encryption algorithms such as RSA and ECC (elliptic curve cryptography). By the time a sufficiently powerful quantum computer becomes available, these encryption methods, which protect virtually all current digital communications, will be obsolete.
The date when cryptographically-relevant quantum computers will appear remains uncertain: estimates range from five to 10 years. However, the risk is immediate due to the "harvest now, decrypt later" attacks that are already taking place, especially for data with a longer lifetime.
If an organization retains sensitive data for the long term, such as financial information, personal data or even trade secrets, this represents a significant and growing risk.
What is at stake is nothing less than the most valuable digital assets: intellectual property, private and sensitive data, authentication systems and secure communications.
The financial, operational and reputational damage from such exposures could be catastrophic, and unavoidable without proactive measures.
What is post-quantum cryptography?Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against attacks by classical and quantum computers. These algorithms are based on mathematical problems that remain difficult to solve even for quantum computers.
In 2024, the National Institute of Standards and Technology (NIST) published its first set of standardized post-quantum cryptographic algorithms, including CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+ and FALCON. In March 2025, NIST selected a new algorithm, Hamming Quasi-Cyclic (HQC), which will serve as a backup to the existing Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) algorithms recommended by FIPS 203 to protect against quantum attacks.
HQC is based on error-correcting codes, a concept that has been fundamental to information security for decades. Unlike ML-KEM, which relies on structured networks, HQC's unique mathematical basis offers a robust alternative that can help combat the potential threats posed by future quantum computers. This shift in mathematical approaches is crucial for maintaining the integrity of encrypted data.
The time for change is nowThe time when currently encrypted data can be decrypted using quantum technology is closer than many people think. However, while most organizations are actively working on cyber resilience strategies, including their core IT infrastructure and components of the supply chain, the risk to quantum computing is not as widely considered.
Changing cryptography in a complex IT environment is not something that can be done overnight. It can take years, especially for large organizations with complex IT environments. Historical precedent shows that major cryptographic transitions typically take 5-10 years to complete.
Beginning the transitionTo begin a transition to post-quantum cryptography, a number of steps must be followed:
1. Cryptographic inventory: Not all data is equally important, and not all data needs to be encrypted in the same way. It is therefore necessary to identify where cryptography should be used in the digital heritage. This should include the most sensitive data, applications, networks, identity systems, and third-party connections.
2. Risk assessment: Given the cost of post-quantum cryptography, it makes sense to prioritize protecting the most sensitive data rather than trying to protect everything. Evaluate your data in terms of its sensitivity and longevity. Information that must remain confidential for more than five years should receive immediate attention. For less sensitive data, standard encryption methods will suffice in keeping it secure.
3. Crypto-agility implementation: Being crypto-agile – having the ability to switch between different cryptographic algorithms in response to new threats – will be essential in the post-quantum era. Develop frameworks that allow you to quickly replace cryptographic algorithms without the need for extensive system redesign. Crypto-agility also requires employee training, so invest time and resources to bring your employees on this journey with you.
4. Prioritized migration: Start with your most sensitive systems and data, particularly those that protect intellectual property or personally identifiable information.
5. Supplier engagement: Confirm that all suppliers in your ecosystem are aligned with emerging standards to ensure end-to-end protection and agility.
In summaryBy starting your post-quantum transition today, you can help protect your organization's most valuable data as we enter the quantum era. The alternative is to wait for quantum computers to break existing encryption – by then, it will be too late for data that has already been compromised. The future is quantum and the time to future-proof your data is now.
We list the best performance management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Think you’ve got your privacy covered? It could be time to give that a rethink, especially if you’re a regular user of X and other social media apps.
A study from leading VPN provider Surfshark has analyzed the default location permissions required by the top 10 social media apps in the Apple App Store and found that most of them are very data-hungry – if not stalker-y.
Elon Musk’s X and Mark Zuckerberg’s Instagram, Threads, and Facebook especially know a lot about where you are… even if you’re using one of the best VPN apps.
Why do social media want your location data?Your smartphone records two types of location data: precise and coarse.
Coarse data is a zoomed-out, low-resolution option that shares your general location in the world. The precise option relies on GPS, Bluetooth, and even IP addresses to determine your exact location based on nearby networks. It is the latter data that X and other networks are using, to varying degrees.
As Surfshark Chief Technology Officer, Donatas Budvytis, explains, precise location data falls under the most sensitive user data category because it can be linked to highly personal behavior and routines.
"This all can lead to building your profile, predicting behavior, or can be used for targeted manipulation and discrimination," said Budvytis.
(Image credit: Surfshark)Location data might be helpful at times. For example, it adds some useful context to photos (and helps you find a specific image years later). It can also help you locate interesting sights and businesses nearby. Social networks, however, seem to be enjoying just a little bit too much of it.
Surfshark has discovered that while eight popular social networks collect precise location data, X is especially keen on it. Instagram, Threads, and Facebook all need a lot, as does Pinterest. Snapchat needs less; LinkedIn and YouTube require almost none.
Collecting user information in this way allows social networks to offer advertisers a better reach, ensuring targeted ads based on your location. They might even send you marketing outreach messages using this sort of data.
According to researchers, X and Pinterest may even use location data to track users. There is no clarity as to how this information is used or whether it is available to data brokers. In such a scenario, various information from other apps could be used in tandem to establish more specific and valuable data about your actions and interests.
Can’t you just use a VPN?A virtual private network (VPN) is security software that encrypts your internet connections, while spoofing your real IP address location. (Image credit: Getty Images)VPNs are great for specific privacy uses, but when it comes to location data collected using GPS and other networks, a VPN is less effective.
Because the VPN encrypts your internet access and routes it via a secure VPN server, only your IP address can be obfuscated. Social networks that rely on GPS and proximity to other networks – perhaps railway stations, or city centre networks – can overlook the notion that your IP address is set to Berlin if your GPS says London.
While a VPN is definitely recommended for public Wi-Fi, it’s only going to prevent bad actors with access to the network. Elon Musk and co can still record your location.
So, can you stop X from tracking you?All social media apps have settings that you can use to tweak what information is collected. So, while you might be okay sharing photos and (potentially embarrassing) thoughts and opinions, you can at least control some of these privacy options.
In the case of X, you can open Settings > Privacy and safety > Location information and disable all three options (tap the third, Explore settings, to toggle it off) to reduce the social network’s hunger for your activities.
Other apps should have similar options. You can, of course, also disable your phone’s GPS when it isn’t required, and review your phone’s location services settings.
You might also likeThe Chief Information Security Officer (CISO) has rapidly evolved from a technical specialist into a strategic business leader. While still responsible for defending against cyber threats, today’s CISOs are also tasked with aligning cybersecurity initiatives to broader organizational goals. This shift is driven by a more complex threat landscape, advances in technology such as AI, and increasing regulatory pressure that holds security leaders to a higher standard of accountability.
As a result, CISOs must bridge the gap between security operations and business strategy. They are expected to translate technical risks into business impacts, engage with executive leadership, and help shape enterprise resilience.
For security and business leaders alike, this evolution highlights the critical need to embed cybersecurity into the fabric of strategic planning and decision-making for the business.
The Changing Threat and Regulatory LandscapeCyber threats are growing in scale and sophistication. Attackers can and do use AI tools to accelerate reconnaissance, craft convincing phishing schemes, and execute ransomware at unprecedented speed. Deepfakes, autonomous malware, and AI-driven social engineering are pushing traditional defenses to their limits.
At the same time, regulatory scrutiny has intensified. Frameworks like the US Security and Exchange Commission's cybersecurity disclosure rules and the European Union’s Network and Information Security Directive 2 (NIS2) demand greater transparency, rapid incident reporting, and clearer communication of cybersecurity’s business impact. As a result, CISOs are more visible than ever—expected to brief boards, own cyber risk posture, and help ensure regulatory compliance.
Expanding Responsibilities of the Modern CISOThe role of the CISO has significantly broadened beyond traditional technical oversight. Today’s CISOs are now pivotal in securing expansive business ecosystems, encompassing cloud infrastructures, third-party vendor relationships, operational technologies, and software-based products. This expansion necessitates a unified approach to security and risk management, integrating these functions at the enterprise level.
In addition to these responsibilities, CISOs are instrumental in driving business efficiency and facilitating the adoption of emerging technologies. Today, the integration of AI tools and automation into security operations is transforming the cybersecurity landscape.
For instance, automation streamlines processes such as vulnerability management workflows, enabling quicker remediation, and AI enhances threat detection and response capabilities by rapidly analyzing vast datasets to identify potential risks, both of which allow security teams to focus on strategic initiatives.
As new technologies that have significant implications for business and cyber security continue to come to market - such as quantum computing and its impact on encryption - CISOs will need to stay on top of operational, business and strategic implications.
By embracing these advancing technologies, CISOs can scale their operations effectively, ensuring that human expertise is applied where it delivers the most significant impact. This evolution underscores the CISO's role as both a protector of information assets and a strategic enabler within the organization.
Bridging Security and Business StrategyTo succeed in this expanded role, CISOs must communicate risk in the language of the business. That means framing threats in terms of financial exposure, operational disruption, and reputational damage—helping executive teams make informed, risk-based decisions.
Regular board of directors engagement is now essential. CISOs must earn trust and ensure that cybersecurity is viewed not just as a compliance obligation, but as a strategic priority.
When embedded into business initiatives from the start, cybersecurity becomes a driver of innovation. It accelerates digital transformation, enables secure cloud adoption, and builds customer trust. Forward-thinking CISOs position security not as a cost center, but as a competitive advantage.
Challenges Facing CISOs in 2025 and BeyondDespite progress, CISOs still face major roadblocks. Budgets are increasing modestly – often by 10% or less - while responsibilities grow rapidly. Security teams remain understaffed, contributing to burnout and resource constraints.
Culturally, many organizations still treat cybersecurity as a siloed IT function rather than a shared business responsibility. This lack of integration slows decision-making and limits effectiveness.
Meanwhile, legal and regulatory accountability is rising. CISOs are being named in lawsuits and enforcement actions, most notably in the SolarWinds breach, raising concerns about personal liability.
Risk-sharing mechanisms such as indemnification and Directors and Officers (D&O) liability insurance - a specialized form of coverage to protect individuals from personal losses if they are sued - are becoming essential safeguards.
As the CISO role continues to evolve, several trends will define the path forward:
AI as Standard: AI-driven detection and response are becoming baseline capabilities.
Quantum-Ready Security: Forward-looking CISOs need to begin preparing for post-quantum threats.
Board-Level Strategic Advisor: More CISOs will report directly to CEOs or boards.
Workforce Development: Organizations must invest in training to address persistent talent shortages.
Integrated Security Culture: Cybersecurity will be embedded into all business functions.
Legal Protections: More formal structures to protect CISOs from undue liability.
To stay ahead, CISOs must focus on strategic alignment, talent development, automation, and executive communication, ensuring that security becomes a shared, organization-wide priority.
From Defender to Business EnablerThe CISO’s transformation into a strategic advisor reflects a broader realization: cybersecurity is business-critical. As technology advances and threats intensify, organizations need leaders who can secure operations while enabling innovation and growth.
Security and business leaders must work in tandem investing in collaboration, communication, and continuous improvement to build resilient, forward-looking enterprises equipped for evolving risks and opportunities.
We list the best identity management solutions.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
CRM software systems were once the digital backbone of business growth, but what worked in the past doesn’t always fit the pace and pressure of today. In 2025, companies aren’t just seeking digital tools, they’re demanding agility, speed, and autonomy. And that’s exactly where legacy CRM systems are falling short.
A new wave of AI-native, no-code platforms is reshaping the industry, moving CRM from a rigid, IT-owned tool into a dynamic, business-controlled engine.
According to a recent Nucleus report, organizations shifting away from legacy vendors such as Salesforce in favor of modern no-code platforms are seeing significant improvements, including implementation times reduced by up to 70%, a 37% drop in total cost of ownership, and lead response times cut by more than 60%.
Here are five reasons why legacy CRMs are fast becoming obsolete, and why no-code is proving to be a promising, modern alternative.
1. Legacy CRMs can’t keep up with today’s speed of businessBusinesses today operate in a state of perpetual change – new markets, new regulations, and new customer expectations. Yet many traditional CRMs, born in a different era, demand lengthy implementation cycles and code-heavy customization just to support basic adaptations.
In contrast, modern systems like no-code platforms are built on composable architectures that prioritize speed, flexibility, and business user autonomy. This allows organizations to configure and scale solutions rapidly without getting held back by complex, developer-led customization.
In fact, we’re seeing companies across core industries like manufacturing and financial services increasingly pivot to no-code models to avoid delays and spiraling costs.
It’s a clear signal that businesses are no longer willing to tolerate multi-year timelines to achieve meaningful outcomes. Adaptability and speed are no longer nice-to-haves, they’re essential for staying competitive.
2. AI and automation are now table stakesBusinesses now rely on AI to deliver personalized experiences, make smarter decisions, and streamline workflows. Yet many legacy CRM systems treat AI as an afterthought – a feature layered on top rather than embedded into the core of the platform.
Modern platforms, by contrast, are AI-native from the ground up. They use machine learning to automate lead routing, predict customer behavior, and optimize campaigns in real time. Organizations embracing these capabilities are seeing substantial improvements, such as a 61% reduction in lead generation response times and higher overall conversion rates.
Automating repetitive and manual tasks assist in giving teams back valuable time to focus on what truly matters, such as strategic thinking, creative problem-solving, and driving business growth.
3. The cost of complexity is unsustainableLegacy CRMs often come with hidden costs: high developer overheads, third-party consulting fees, and expensive integrations that require constant maintenance. The burden on IT is immense, and the total cost of ownership (TCO) continues to climb long after deployment.
No-code platforms significantly lower these expenses, with firms reporting up to a 70% reduction in development costs and average savings of over $300,000 on external consultancy fees.
Newer no-code platforms remove many of these barriers by enabling configuration and updates without specialized technical knowledge. As a result, organizations are seeing a meaningful reduction in total cost of ownership. ROI is scrutinized more than ever, and the economic case for moving away from legacy tools is increasingly compelling.
4. Business teams demand controlLegacy CRM systems were designed with IT departments in mind, often requiring developer intervention for even simple changes. This creates bottlenecks and slows down innovation, particularly for departments like sales and marketing that need to move quickly and iterate on processes in real time.
No-code platforms are reversing this dynamic by giving control directly to business users. In fact, the number of citizen developers - non-technical employees empowered by no-code tools to build applications - is expected to rise by 50% this year.
With drag-and-drop interfaces, visual workflow designers, and intuitive configuration tools, non-technical staff can build and refine processes without needing to go through IT. This decentralized control fosters agility and allows organizations to respond to market shifts much faster.
5. Unified platforms drive real business agilityLegacy CRMs often operate in silos - disconnected systems for sales, marketing, service, and operations that struggle to communicate with one another. This fragmented approach creates inconsistent experiences and significant operational drag.
Modern no-code CRMs break down these barriers by unifying all functions within a single, cohesive platform. Shared data models, integrated workflows, and real-time visibility empower teams to collaborate seamlessly, respond faster to customer needs, and drive consistent outcomes.
With AI embedded throughout, this unification is key to enabling true business agility - not just reacting quickly, but aligning seamlessly across departments to deliver smarter, more cohesive customer experiences.
The no-code future is already hereThe rise of no-code platforms marks a turning point in enterprise software. Rather than relying on rigid, IT-managed systems that require months of development and a deep bench of engineers, businesses now have access to tools that are fast, flexible, and accessible to all.
For organizations still tied to legacy CRM systems, the question is no longer if change is coming, it’s how quickly they can catch up. No-code isn’t just a trend. It’s a response to the urgent need for speed, adaptability, and user empowerment in the business environment.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
A function that was once buried deep within IT departments, cyber security is now firmly making its way up the boardroom agenda. 72% of UK businesses now classify cyber security as a high priority, with that extending to 96% of large businesses.
As recent high-profile breaches at M&S, Co-op and Harrods have shown, cyber resilience is now central not only to operational integrity but also to brand value, regulatory compliance and investor confidence.
Greater awareness has emerged as businesses shift from short-term solutions adopted during the pandemic to long-term, strategic partnerships with specialist cyber security providers. Increasingly, organizations recognize that cyber security requires an integrated approach involving continuous monitoring and proactive risk management.
The growing complexity and specificity of cyber threats mean that a bespoke, tailored approach is necessary, driving demand for advisory-led solutions delivered by experienced, security-cleared professionals.
That shift in perception is now being reflected in dealmaking. In the second quarter of 2025, the UK cyber market saw a flurry of M&A activity, much of it led by private equity platforms executing bolt-on acquisitions. These transactions may not always grab headlines, but they are sending a clear signal - cyber security is a strategic growth priority.
A new kind of riskThe cyber threat landscape has evolved. Today’s attacks are more frequent, more sophisticated and more damaging. The recent incidents involving the “Scattered Spider” group are just the latest reminder of the long-term impact these attacks can have, beyond the legal and financial consequences, but to customer trust and brand reputation. That’s why boardrooms are starting to reassess their cyber readiness.
In sectors such as public services, infrastructure and education - where the risks of failure are especially high - strong cyber defenses are no longer optional.
In addition, the rapid advancement of AI will accelerate cybersecurity risks, as it lowers the barrier for executing sophisticated attacks and enables threat actors to automate, scale, and personalize their tactics with unprecedented precision.
Regulation is raising the stakesAt the same time, government regulation is putting company directors firmly on the hook. The UK’s proposed Cyber Security and Resilience Bill will make senior executives directly accountable for managing cyber risks and ensuring operational resilience, bringing the UK closer to European frameworks like the NIS2 Directive and DORA.
This is changing how cyber security is viewed at the top. It’s not just about ticking boxes or passing audits. It is now a central part of good governance. For investors, strong cyber capabilities are becoming a mark of well-run companies. For acquirers, it’s becoming a critical filter for M&A, particularly when dealing with businesses that hold sensitive data or operate critical systems.
This regulatory push is part of a broader global shift towards greater accountability. In response, businesses are increasingly adopting governance models that embed cyber risk management into their strategic decision-making processes. Boards that fail to adapt not only risk regulatory penalties but also stand to lose investor confidence and market competitiveness.
Private Equity steps inWhile overall deal values are still below long-term trends, deal volumes are rising. In Q2 alone, there were 114 cyber-related deals across Europe and North America, well above average. In the UK, activity is particularly strong in the small to mid-sized market, with private equity firms at the forefront.
Cyber security is a highly fragmented mission critical sector with strong recurring revenues, sticky customer relationships and a compelling margin profile. In an environment where investors are increasingly focused on resilience over growth, these are attractive attributes.
From product to partnershipThe post-Covid shakeout is also playing a role. Many companies quickly adopted off-the-shelf solutions during the pandemic to meet urgent needs. Today, with greater familiarity and a clearer understanding of risk, boards are opting for more tailored, enterprise-grade services.
This is not just about technology, there is a growing premium on advisory-led solutions. Highly qualified, security-cleared professionals providing bespoke assessments and continuous monitoring. In other words, clients want expertise and service, not just software.
From a valuation perspective, this matters. While public market multiples continue to fluctuate, exposed to macro shifts such as US tariff announcements earlier this year, premium valuations continue to cluster around providers with diversified offerings and deep client integration. As PE buyers weigh bolt-ons and platforms, these traits are driving acquisition rationale.
Players need to stay aheadThe forces pushing cyber up the corporate agenda aren’t going away. Threat actors are growing bolder, regulators are getting tougher and the risks remain high.
The result is a market in transition. What began as a compliance arms race is evolving into a sophisticated, services-led ecosystem. For dealmakers, this creates opportunity but also demands discernment. Not every cyber asset will command a premium.
The winners will be those with deep expertise, defensible margins and client relationships that extend beyond the server room.
We list the best client management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Hyper-personalized AI is transforming the workplace. Unlike standard automation, it works by learning from individual user behaviors, allowing businesses to tailor interactions on a much more human level. Not only does it help businesses to streamline their operations, it also drives efficiency while enhancing the user experience.
For employees, AI can suggest ways to improve productivity, automate repetitive tasks and provide real-time insights based on their work habits. In contact centers, for example, it can escalate intuitively from an AI Agent to a call with a human if it's a nuanced or complex problem.
While in retail, AI-powered assistants make personalized recommendations and offer timely discounts based on past interactions, purchasing history and market trends, which can result in impromptu purchases. It allows customers to feel like they are being listened to – and that their previous purchases are appreciated.
And it is this increasingly natural and ‘human’ experience that is helping to redefine what a digital brand interaction looks and feels like. The impact cannot be ignored.
According to Gartner, businesses investing in hyper-personalization are experiencing an uptick of 16% in commercial outcomes. The ability of AI to refine and improve interactions in real-time makes it a valuable tool for business growth. But as AI becomes more embedded – as it becomes smarter and more human – there are concerns over the impact this might have on privacy and security.
Ensuring privacy and securityAfter all, the very nature of hyper-personalized AI presents a paradox. The more an AI system knows about an individual, the better its recommendations. But this has led to some people raising concerns over issues such as surveillance, consent and the potential misuse of data.
It’s one of the biggest question marks still hovering over the issue of continuous learning. And without proper governance, AI may retain sensitive information, increasing the risk of unauthorized access, data breaches and regulatory non-compliance.
Thankfully, high-profile regulations such as GDPR and California Consumer Privacy Act (CCPA) frameworks already impose strict rules on data handling, and businesses failing to comply face not just legal repercussions but also reputational damage. But, that hasn’t stopped some people from pursuing AI-specific legislation – such as the AI Act in the EU – to provide specific protection.
There’s also an ethical dimension. Poorly designed AI can inadvertently reinforce biases or expose personal details that should remain confidential. If employees and customers lose trust in AI systems, companies will struggle to gain the full benefits of hyper-personalization. To thrive, organizations need to harness the power of AI while ensuring that privacy isn’t compromised.
How businesses can balance AI innovation with privacyThe good news is that businesses don’t have to choose between AI-driven efficiency and data privacy – they can have both. The solution lies in embedding privacy-first, responsible AI principles into frameworks and strategies from the outset. Here’s how:
Anchor core, long-lasting principles: Build ethical, trustworthy AI systems by prioritizing transparency, inclusiveness, and ongoing monitoring to foster trust and drive lasting value.
Establish robust governance: Define clear policies, conduct risk assessments, and assign dedicated roles to ensure compliance and ethical AI practices.
Ensure data integrity: Use high-quality, unbiased data to deliver fair and accurate AI outcomes across all user groups.
Adhere to compliance needs: Proactively address tightening regulations with strong governance and data protection to mitigate legal risks.
Test and monitor consistently: Conduct regular testing and continuous monitoring to align AI with ethical standards and performance goals.
Optimize tools effectively: Leverage advanced platform features like retrieval mechanisms and feedback loops to enhance transparency and ethical behavior.
Human oversight and participation is also part of the puzzle in optimizing and building trust in AI. At key points in AI workflows, humans help ensure accuracy and reliability. For example, in Agentic Workflows, AI breaks tasks into smaller steps and handles repetitive work, while humans review important decisions before final actions are taken.
AI then continuously learns from human input, improving over time. This approach combines the speed and efficiency of AI with the judgment and experience of human workers to create a system that is not only faster but also more reliable and adaptable.
In other words, with the right safeguards – and the right leadership and employee engagement strategy to ensure these protocols are followed – businesses can unlock the full potential of hyper-personalized AI without compromising security or trust.
The future of AI and privacy: staying ahead of the curveWhat’s more, businesses that integrate privacy-first thinking into their AI strategies are likely to be the ones that thrive in the long run. The key is to build a governance framework that not only meets regulatory standards but also fosters trust among employees and customers.
One of the first steps is ensuring AI tools are rigorously assessed before deployment. That means evaluating how data is being processed, stored and used. It would also help to run pilot programs to help iron out privacy concerns and identify risks before full-scale implementation.
From the beginning, you need to work with a trusted provider to define and configure algorithms to prevent unintended biases and ensure fairness across different user groups at every level, whether it's an LLM, agent or App. AI should also be designed to evolve responsibly, integrating smoothly into workflows while maintaining strong privacy protections.
Clear visibilityObservability and traceability are crucial. Not only should people have clear visibility into how AI makes decisions, they should also be able to challenge or verify AI-generated outputs with real-time tracing, explainable AI decision paths and thought streaming.
Organizations should also be actively monitoring and optimizing AI agent performance with comprehensive analytics that track the likes of latency, workflow success, and operational efficiency. Adopting such an approach would help to build confidence while reducing the risk of AI being perceived as a black box.
Finally, we must never forget who has the final word. AI should be an enabler, not a replacement for human expertise. Organizations that combine AI’s analytical capabilities with human judgment will be better positioned to innovate while maintaining ethical and privacy standards.
There’s a lot to take in. But one thing is clear. Hyper-personalized AI presents enormous opportunities for businesses. But it comes with responsibilities. Work with vendors with a responsible AI framework and platform that ensure robust tools and embedded ethical considerations for meticulous data curation, rigorous model testing, ongoing transparency, and continuous monitoring and adaptation of AI systems.
The result then becomes not just compliance but also enhanced user trust and exceptional experiences, setting the stage for pioneering a future where AI is a trusted ally.
We feature the best employee management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The open source movement in 3D printing once thrived on shared designs, community projects, and collaboration across borders.
However, Josef Prusa, head of Prusa Research, has announced, “open hardware desktop 3D printing is dead.”
The remark stands out because his company long championed open designs, sharing files and innovations with the wider community.
Economic support and patent challengesPrusa built his early business in a small basement in Prague, packing frames into pizza boxes while relying on contributions from others who shared his philosophy.
What has changed, he now argues, is not consumer demand but the imbalance created when the Chinese government labeled 3D printing a “strategic industry” in 2020.
In his blog post, Prusa cites a study from the Rhodium Group which describes how China backs its firms with grants, subsidies, and easier credit.
This makes it much cheaper to manufacture machines there than in Europe or North America.
The issue grows more complicated when looking at patents. In China, registering a claim costs as little as $125, while challenging one ranges from $12,000 to $75,000.
This gap has encouraged a surge of local filings, often on designs that trace back to open source projects.
Prusa’s earlier machines, such as the Original i3, proudly displayed components from partners like E3D and Noctua, embodying a spirit of community, but were also easy to copy, with entire guides appearing online just months after release.
The newest Prusa printers, including the MK4 and Core ONE, now restrict access to key electronic designs, even while offering STL files for printed parts.
The Nextruder system is fully proprietary, marking a clear retreat from total openness.
Prusa argues Chinese firms are effectively locking down technology the community meant to share - as while a patent in China does not block his company from selling in Europe, it prevents access to the Chinese market.
A bigger risk emerges when agencies like the US Patent Office treat such patents as “prior art,” creating hurdles that are expensive and time-consuming to clear.
Prusa cited the case of the Chinese company, Anycubic, securing a US patent on a multicolor hub that appears similar to the MMU system his company first released in 2016.
Years earlier, Bambu Lab introduced its A1 series, also drawing inspiration from the same concept.
Anycubic now sells the Kobra 3 Combo with this feature, raising questions about how agencies award patents and who holds legitimate claims.
Meanwhile, Bambu Lab faces separate legal battles with Stratasys, the American pioneer whose patents once kept 3D printing confined to costly industrial use.
Declaring the end of open hardware may be dramatic, but the pressures are real.
Between state subsidies, permissive patent rules, and rising disputes, the foundation of open collaboration is eroding.
Via Toms Hardware
You might also likeToday's Real Oviedo vs Real Madrid live stream sees La Liga football finally return to the Estadio Carlos Tartiere in Oviedo, as the Spanish league's minnows take on its biggest fish.
Los Blancos' start to the domestic season was steady rather than spectacular. A Kylian Mbappé penalty was enough to secure a 1-0 home win over Osasuna in a game that was more notable for league debuts for the incoming Trent Alexander-Arnold, Dean Huijsen and Álvaro Carreras.
Making their first appearance in the top flight for 24 years, Oviedo couldn't have been handed a much tougher start. They lost an away trip to Villareal first up, having debutant Alberto Reina getting sent off in the process. And now they face 36-time winners Real Madrid.
Read on for our guide on where to watch Real Oviedo vs Real Madrid live streams online in La Liga wherever you are today.
Real Oviedo vs Real Madrid team newsReal Oviedo XI: Escandell, Alhassane, Calvo, Costas, Luengo, Sibo, Chaira, Dendoncker, Ilić, Vidal, Rondón
Subs: Bailly, Brekalo, Cazorla, Colombatto, Ejaria, Esteban, Falah, Forés, Gueye, Hassan, Moldovan, Viñas
Real Madrid XI: Courtois, Carreras, Huijsen, Rüdiger, Carvajal, Rodrygo, Tchouaméni, Valverde, Mastantuono, Mbappé, Güler
Subs: Díaz, Alexander-Arnold, Asencio, Ceballos, Gonzalo García, Fran, García, Lunin, Mestre, Militão, Alaba, Vinícius Júnior, Pitarch
How to watch Real Oviedo vs Real Madrid live streams in the USThe Real Oviedo vs Real Madrid live stream is on the newly rebranded ESPN streaming platform in the US. Monthly subscriptions cost from $11.99 a month with the ESPN Select tier or you can upgrade to an Unlimited Plan for $29.99 a month or $299 a year, which also bundles in standard ESPN channels.
Alternatively, if you have access to ESPN Deportes via cable or an OTT streaming service, this La Liga game will also be shown there.
On holiday outside of the US? A VPN will allow you to access your usual US subscription from abroad. We recommend NordVPN as the best overall streaming VPN.
Use a VPN to watch any Real Oviedo vs Real Madrid streamEditors ChoiceNordVPN – get the world's best VPN
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it's very straightforward to use. Speed, security and 24/7 support available if you need – it's got it all.
The best value plan is the two-year deal which sets the price at just $3.09 per month with 3 extra months free. There's also an all-important a 30-day no-quibble refund if you decide it's not for you.
- Try NordVPN 100% risk-free for 30 daysVIEW DEAL ON
Premier Sports is broadcasting the Real Oviedo vs Real Madrid La Liga match live in the UK.
Premier Sports costs £16.99 on a rolling monthly basis. To save money, you can commit to a year for £11.99 per month or one upfront payment of £120.
Not in the UK right now? To access your usual streaming service from outside the UK, you'll need to download a good VPN, as detailed above.
How to watch Real Oviedo vs Real Madrid in CanadaLa Liga fans in Canada can live stream Real Oviedo vs Real Madrid thanks to the TSN Plus streaming service. It costs $8 a month or $80 for a whole year. The service carries all TSN live sports on the likes of web browsers, smartphones, tablets, select Smart TVs, Fire Stick, Apple TV, Chromecast, Roku and Xbox.
This match is not listed as showing on TSN on TV.
Outside Canada while the soccer is on? Simply use a VPN to watch from abroad.
How to watch Real Oviedo vs Real Madrid in AustraliaSoccer fans in Australia can watch Real Oviedo vs Real Madrid on beIN Sports, with kick-off at 5.30am AEST on Monday morning.
beIN Sports costs $15.99 a month or you can save big by going for the annual plan that's currently discounted to $129.99. And if you're new to the specialist sports streamer, you can take advantage of its free one-week trial.
How to watch Real Oviedo vs Real Madrid in New Zealand?In New Zealand the Real Oviedo vs Real Madrid live stream will be on beIN Sports, which offers new users a 7-day FREE trial. The match starts at 7.30am NZT on Monday morning.
You can add beIN Sports to most pre-existing TV packages, or you can sign up as a separate subscription. It costs $14.99 month or $129.99 if you pay for a year up front, once that week-long trial ends.
In New Zealand on vacation right now? You can simply use NordVPN to catch all the action you need.
When does Real Oviedo vs Real Madrid start?Real Oviedo vs Real Madrid kicks off at 9.30pm CEST in Spain on Sunday, August 24, which is 3.30pm am ET / 12.30 PT in the US and 8.30pm BST in the UK.
That's 5.30am AEST / 7.30am NZST on Monday, August 25 for fans based in Australia and New Zealand.
Can I watch Real Oviedo vs Real Madrid on my mobile?Of course, most broadcasters have streaming services that you can access through mobile apps or via your phone's browser letting you live stream Real Oviedo vs Real Madrid on the go.
We test and review VPN services in the context of legal recreational uses. For example:1. Accessing a service from another country (subject to the terms and conditions of that service).2. Protecting your online security and strengthening your online privacy when abroad.We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.
The world's expanding network of data centers has often been linked with heavy environmental costs, especially when it comes to water.
These facilities form the base for cloud services, LLM training, and the many AI tools now embedded across industries.
However a new survey by techUK, conducted with the UK Environment Agency, has claimed data centers are “not intensive water users” as many people think.
Very few sites with industry-level water usageThe report found nearly two-thirds (64%) of commercial sites in England consume less than 10,000 cubic meters of water per year.
This level of demand is described as lower than that of a “typical leisure center” and similar to the water requirements of a Premier League football club.
Only 4% of facilities reported usage over 100,000 cubic meters annually, a figure associated more with industrial production.
Cooling has long been considered the driver of data center water consumption, although the industry is now moving toward alternatives such as waterless and closed-loop systems.
More than half of the facilities surveyed already rely on waterless cooling, while many others use direct-to-chip techniques that recycle water within sealed systems.
In fact, 89% of operators said they no longer track consumption because their systems use “no water beyond the regular functioning of any building.”
While the report stresses operators are “actively innovating” to cut demand, skepticism remains.
Questions also remain over whether reported figures capture the full lifecycle of water use, including indirect impacts from energy generation.
TechUK argues that data centers are vital for the UK economy, contributing billions in annual value and enabling ambitions in AI and digital innovation.
The trade body is calling for stronger planning frameworks, including a proposed “water exploitation index” to track local stress levels.
“I am encouraged by the work techUK has undertaken to better understand water usage, and the findings suggest UK data centers are using a range of cooling technologies and becoming more water conscious,” said Richard Thompson, Deputy Director for Water Resources at the Environment Agency.
“It is vital the sector puts sustainability at its heart, and minimizes water use in line with evolving standards."
You might also likeKioxia has developed a new type of prototype flash memory module which offers both large capacity and high bandwidth.
The module was created under Japan’s Post-5G Information and Communication Systems Infrastructure Enhancement R&D Project led by NEDO, the national research agency.
The module offers 5TB of storage and a transfer rate of 64GB/s, positioning it as a potential alternative or supplement to conventional DRAM in data processing. Kioxia said the design addresses the long-standing trade-off between bandwidth and capacity found in DRAM modules by arranging flash memory chips in a daisy-chain rather than a bus connection.
Beads of flashEach flash unit, described as a bead, is connected in sequence with its own controller. The daisy-chain design allows capacity to expand without degrading bandwidth, something which has been a limitation in earlier architectures.
The company also developed high-speed transceivers capable of 128Gbps throughput. These use PAM4 modulation, which encodes two bits of information per signal, doubling the effective bandwidth compared to traditional binary signalling.
Alongside this, new controller features such as prefetching help reduce read latency, while low amplitude signalling and distortion correction increase the memory interface’s speed to 4.0Gbps.
Kioxia reported the prototype consumes less than 40W when operating at full bandwidth over a PCIe Gen 6 eight-lane connection.
The combination of power efficiency and throughput is being presented as a step toward making flash more practical in memory-intensive roles usually filled by DRAM.
The work is targeted at servers in mobile edge computing environments, where 5G and 6G networks create the need to process information closer to end devices.
Real-time IoT and AI workloads are driving interest in memory systems that balance cost, capacity, and performance.
Kioxia said it plans to continue developing this technology toward commercialization, with potential uses in IoT, big data analytics, and advanced AI models including generative AI.
(Image credit: Kioxia)You might also likeA new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: Quordle hints and answers for Sunday, August 24 (game #1308).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1309) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 3*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1309) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 2.
Quordle today (game #1309) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• Yes. One of Q, Z, X or J appears among today's Quordle answers.
Quordle today (game #1309) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1309) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• G
• S
• C
• J
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1309) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1309, are…
A game of two Hail Mary guesses for me today that somehow both came off.
GEEKY felt the most unlikely. I guessed it with just a G and a single E both in the wrong positions but with no other vowel possible I convinced myself there had to be two Es and that was the first playable word that came to mind.
Sometimes I love this game.
Daily Sequence today (game #1309) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1309, are…
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Connections hints and answers for Sunday, August 24 (game #805).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #806) - today's words(Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #806) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #806) - the answers(Image credit: New York Times)The answers to today's Connections, game #806, are…
I really enjoy the little jokes in Connections when I see them, which isn’t always, and today the PEARL and JAM tiles jumped out right away. I often feel as if these bits of wordplay are the starting point for the creators.
Anyway, this was a particularly tricky start to the puzzling week that took me a long while to put together.
At first I thought that PIPE CLEANER and POM-POM belong together as they were made out of wool or fake wool, but this thought process led me up a blind alley that cost me a mistake.
Then, I thought we were looking for elements of fairytales so I had PEA for Princess and the Pea, FEATHERS for The Three Feathers, and PEARL for The Last Pearl. That cost me another mistake before I started to get things right.
I got PIPE-SMOKING ACCESSORIES thanks to LIGHTER and PIPE CLEANER and then PREDICAMENT and SMALL SPHERICAL THINGS fell into place. Challenging, but I’m glad it’s all over.
Yesterday's NYT Connections answers (Sunday, August 24, game #805)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Sunday's puzzle instead then click here: NYT Strands hints and answers for Sunday, August 24 (game #539).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #540) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… Back to school
NYT Strands today (game #540) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 8 letters
NYT Strands today (game #540) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: right, 5th row
Last side: left, 5th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #540) - the answers(Image credit: New York Times)The answers to today's Strands, game #540, are…
I had a bit of a back-to-front day today tapping out “top” and “lap” before I saw we were searching for LAPTOP and tapping out “book” and “note” before seeing NOTEBOOKS.
I just about got through without using a hint although I was sorely tempted after a slow start.
You will never need as many SUPPLIES for the rest of your life as you do at school. Well for your first day of school anyway. After the first week you wise up and realize you don’t have to fill your gigantic BACKPACK with every single piece of stationery item you may possibly need for the next decade.
Yesterday's NYT Strands answers (Sunday, August 24, game #539)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.