Most Louisianans no longer speak French, but a growing number of schools are now immersing kids in it. At École Pointe-au-Chien, the focus is on teaching local French dialects first.
(Image credit: Aubri Juhasz)
Author Gary Rivlin says regulation can help control how AI is used: "AI could be an amazing thing around health, medicine, scientific discoveries, education ... as long as we're deliberate about it."
Prime Video has renewed the historical drama House of David for a second season ahead of its series finale on April 3.
House of David, which launched with three episodes on February 27, attracted 22 million viewers in its first 17 days of streaming and claimed the second spot in Prime Video's top 10 shows list, falling behind Reacher season 3.
With a growing library of historical dramas, Prime Video is becoming one of the best streaming services for religious TV shows. Its sprawling library has the likes of The Chosen, a hugely successful series that dramatizes the life of Jesus Christ. With a 60% Rotten Tomatoes score from the critics, House of David doesn't make it onto our best Prime Video shows list. However, it's clearly been a huge hit among audience given its staggering results.
Show creators Jon Erwin and Jon Gunn said of the renewal: “We are humbled by the extraordinary reaction this show has earned from the faith audience worldwide. Thanks to them and our partners at Prime Video and Amazon MGM Studios, Wonder Project will bring more of the Bible and this epic saga to a global audience. Congratulations to our incredible cast and crew.”
What is House of David season 2 about?The biblical epic tells the story of David (Michael Iskander), a teenage outcast who is anointed the new king of Israel as the once-mighty King Saul (Ali Suliman) falls victim to his own pride and begins to lose power.
House of David season 2 follows David's rise to the throne in the aftermath of his battle with Goliath (Martyn Ford). As he navigates palace politics, his family's jealousy and a growing romance, David learns what it means to become a great leader.
Vernon Sanders, head of television at Amazon MGM Studios shared: “Jon Erwin and Jon Gunn’s compelling creative vision has solidified our belief in the series and we are excited to deliver more of the story to our customers. We look forward to a continued journey with Wonder Project as we further expand our slate to encompass faith-based series.”
You might also likeIsrael's military launched a new ground offensive in Gaza, sending troops into areas they retreated from during a two-month ceasefire. This comes a day after airstrikes killed more than 400 people.
(Image credit: Jack Guez)
ExpressVPN has announced a round of redundancies in an official statement.
This is the second time the Kape Technologies-owned company has taken the axe to its workforce in two years after it shed 12% of its staff in July 2023.
According to Tom’s Guide, ExpressVPN has not specified the number of jobs lost, so far, with the statement only reading that the company has taken the “difficult decision to reduce the size of our workforce".
The statement does not mention any cuts at either Private Internet Access (PIA) or CyberGhost – two VPNs also under the Kape umbrella.
ExpressVPN is still currently advertising several job openings in both Engineering and Security on the company website, as well as in Marketing and Accounting & Finance. So, how significant this is as signs of trouble ahead for this VPN service is hard to gauge.
(Image credit: ExpressVPN)Indeed, ExpressVPN recently released significant updates to its VPN protocol, Lightway, alongside major updates to its Linux app earlier this month. The company also entered the eSIM market with the launch of holiday.com back in December.
There also seem to be plenty of funds in the marketing coffers with ExpressVPN announcing a partnership with Tottenham Hotspur Football Club as the official Digital Privacy Partner in November.
ExpressVPN places third in TechRadar's best VPN guide at the time of writing. It topped those charts for several years until the beginning of 2024 when NordVPN was named best VPN.
ExpressVPN slipped further later that year when Surfshark climbed to second.
We look forward to re-testing ExpressVPN in the coming months to see how its Lightway protocol has improved and whether its bid to be the fastest VPN on the block has received a boost from Lightway Turbo.
You may also likeExecutive orders from President Trump have agencies across the government scrubbing websites of photos and references to transgender people, women and people of color.
(Image credit: Tara Anand for NPR)
Things have been looking up for Mac gamers in recent years, with Apple launching increasingly powerful hardware and AAA games coming to the company’s computers in increasing numbers. Now, there are a few new reasons why Mac gaming could be getting a touch more immersive.
The first is that Nanoleaf has just launched the PC Screen Mirror Lightstrip, which is a lighting strip for Mac and PC desktop monitors that provides rainbow effects for an immersive experience while gaming, listening to music, or watching TV shows and movies.
The strip connects to your computer over USB-C and needs to be paired using Nanoleaf’s desktop app. Once that’s done, its lights can actively match what is happening on your screen, providing a backlighting effect that extends the on-screen colors to your surroundings.
Nanoleaf’s Lightstrip costs $49.99 and can be pre-ordered from the company’s website. It’ll start shipping at the end of March.
Apple patent points to a haptic gaming Magic Mouse (Image credit: Kaboompics.com / Pexels)While Nanoleaf’s latest product is available to order now, there’s another idea that could give Mac gamers a boost that’s a little more experimental, and it comes in the form of a freshly uncovered patent (via Patently Apple).
The patent describes how a future Magic Mouse could be embedded with haptic sensors that mimic the effects of on-screen action. For example, it could enable you to feel the texture of moving through sand or sliding on ice, providing a much more immersive gaming experience.
Right now, Apple’s Magic Mouse is poorly suited to gaming due to its slippery top surface, unergonomic shape, and lack of customizable buttons. While the ideas discussed in the patent might help make it more viable for gaming, it will need a more wide-ranging overhaul before it becomes gamers’ pointer of choice. That said, the idea of a mouse embedded with haptic sensors could equally apply to creative and productivity tasks, so there’s a degree of flexibility here.
Being a patent, we don’t know when – or if – this will ever come to fruition. But it’s interesting to imagine how it could benefit Mac gamers and productivity lovers alike.
You might also likeOne of the largest sperm banks in the United States has suffered a cyberattack in which it lost sensitive customer data.
California Cryobank confirmed the news in a filing with the Maine Office of the Attorney General, as well as in a data breach notification letter being sent out to affected individuals.
In the notification letter, the company said that it detected suspicious activity on its network on April 21, 2024, and isolated potentially affected devices from the network.
What about Donor IDs?"Through our investigation, CCB determined that an unauthorized party gained access to our IT environment and may have accessed and/or acquired files maintained on certain computer systems between April 20, 2024 and April 22, 2024," the letter says.
California Cryobank is a sperm and egg bank that provides reproductive services, including sperm donation, egg freezing, and genetic screening. It is among the largest sperm banks in the United States, offering a diverse range of donors and services, and operating in all 50 states and more that two dozen countries around the world.
A more thorough investigation, which lasted almost a year, CCB concluded that different personal data was exposed for customers, such as names, bank accounts and routing numbers, Social Security numbers, driver's license numbers, payment card numbers, and/or health insurance information. It did not say how many people were affected.
It is unclear if donor information, such as donor ID numbers, was stolen in the attack, as well. When a person donates sperm, they are assigned an ID number, and their identity remains hidden until the child turns 18 and decides to learn more about their biological father. Leaking ID numbers could be a major privacy concern.
The company has offered a year’s worth of credit monitoring to people whose Social Security numbers and driver’s license numbers were exposed in the attack.
Via BleepingComputer
You might also likeQualcomm has announced its new lineup of Snapdragon G series processors for the handheld market.
Announced in an official blog post, the Snapdragon G Series is made up of three different platforms: the Snapdragon G3 Gen 3, Snapdragon G2 Gen 2, and the Snapdragon G1 Gen 2.
The company claims its latest chips are "designed with gamers in mind" to "deliver sustained graphics performance on handheld, dedicated devices". It promises "high-fidelity graphics" with "incredible ergonomics" for those wanting their mobile games at their best.
As the naming conventions may elude to, the Snapdragon G3 Gen 3 is said to be the most powerful of the lineup, made for the "most demanding cross-platform gaming titles" whereas the Snapdragon G2 Gen 2 is instead primarily marketed for "cloud games across major ecosystems".
This is backed up by the technical specifications of the Snapdragon G3 Gen 3, which feature an eight-core Qualcomm Kyro CPU, Adreno A32 graphics (including ray tracing functionality), Wi-Fi 7, Bluetooth 5.3, and support for 1440p at 144Hz.
The Snapdragon G2 Gen 2 is similarly powerful, with the same eight-core Qualcomm Kyro CPU, but it features Adreno 22 graphics instead, with the same connectivity standards and output options.
Things only get more mainstream when analyzing what the Snapdragon G1 Gen 2 can do. Despite having the same eight-core processor as the others, six of its total cores are efficiency, with only two dedicated to performance.
Similarly, it has weaker Adreno A12 graphics, and only support for Full HD (1080p) at 120Hz with Wi-Fi 5 and Bluetooth 5.1. It's safe to say this could be the chip found in cloud gaming devices that do not require the same level of horsepower.
Some of its partners running the new chips include AyaNeo, OneXSugar, and Retroid Pocket, among others, as the hardware is primarily geared towards Android and cloud gaming performance rather than native rendering. However, given the prowess of the leading chip, that could change depending on who adopts the silicon.
A step forward for mobile gaming hardwareQualcomm has had great success over the past year since its Snapdragon X Elite line, powering some of the best laptops and best ultrabooks, famed for their snappy performance and long battery lives when compared to traditional x86 alternatives. The company now seems in a position to take on some of the biggest processors from rivals, such as AMD's Z1 and Z2 chips that you'll find in some of the best gaming handhelds.
We may not see a similar level of compatibility and performance with Windows or SteamOS machines, but for what they are, the Snapdragon G Series could still be a viable alternative. Some handhelds hitting the market have already impressed featuring the Snapdragon G3 Gen 3 chip, like the AyaNeo Pocket S2, which is said to elevate Android gaming without the usual trappings of getting warm (via PCMag).
Just as Windows on Arm has evolved since it launched and was iterated upon as the big x86 alternative, the Snapdragon G Series could be the thing to push more handheld gamers into the arms of dedicated cloud-based and Android machines if the battery lives, displays, and ergonomics can outmatch what current-generation handheld PCs can do.
Competition is always a good thing as it pushes companies to continue innovating and improving on tech instead of stagnation, something the portable scene has been in danger of for years now. Will the Snapdragon G Series be enough to frighten AMD and Intel? It's not clear yet, but we've seen Qualcomm muscle in on their territory with its laptops, so why couldn't handhelds be next?
You may also like...The decision offers a venue compromise in the bellwether case, while Khalil's legal team seeks to release him from detention and block his deportation.
(Image credit: Selcuk Acar)
With rising utility bills and the increasing cost of living, consumers need more support than ever—especially the most vulnerable. Acknowledging vulnerability isn’t enough; organizations must take action to ensure no one falls through the cracks.
Recent research from Focal Data highlights a growing number of UK adults who are either already in or on the verge of vulnerable situations. However, there is encouraging news: awareness is increasing, particularly among younger generations, and organizations now have clear, actionable guidance on providing meaningful support.
As consumer vulnerability evolves, technology leaders are crucial in driving solutions that ensure no customer is left behind. Their responsibility extends beyond deploying new tools; it involves strategically integrating AI to help customer service teams deliver scalable, empathetic, and effective support.
Additionally, as sectors such as financial services, utilities, and retail face increasing regulatory scrutiny and ethical concerns around data and AI usage, technology leaders must provide guidance to ensure compliance and responsible AI deployment.
35 million UK adults are potentially vulnerableThe Financial Conduct Authority (FCA) identifies four key drivers of vulnerability, a framework that extends beyond financial services and helps organizations understand the complexities behind consumer vulnerability:
1. Health issues (mental and physical illness)
2. Life events (including bereavement and job loss)
3. Low resilience (the inability to withstand financial or emotional shock)
4. Low capability and confidence (in dealing with financial matters)
Based on these criteria, the Focal Data research estimates that 35 million UK adults—approximately two-thirds of the adult population—are potentially vulnerable. Despite this, only 19% of those affected self-identify as vulnerable, and 34% of consumers would be uncomfortable disclosing mental health challenges.
Delivering support at this scale is an immense challenge, made even more difficult by low awareness and reluctance to discuss vulnerability. Many organizations believe they have sufficient processes in place to support vulnerable customers. Yet, when examined closely, the reality is quite different. On average, only around 3% of calls are screened for vulnerable customer support, and even fewer are routed to appropriate processes. This stark gap exposes many organizations to regulatory risks and, more importantly, leaves vulnerable customers without the support they need.
Younger adults show greater self-awareness, yet pressure remainsThere is, however, some hope. Younger adults, particularly those under 34, are leading the way in self-awareness, with 31% identifying as vulnerable. This increased self-awareness is a promising step toward more open communication about financial and personal struggles.
However, organizations cannot rely on self-identification alone. This puts undue pressure on customer service advisors to recognize vulnerability based solely on soft skills and single interactions. Advisors are expected to identify a customer’s vulnerability while simultaneously searching for accurate information, leading to potential bias and missed signs. For example, a customer displaying subtle signs of stress may be perceived as just another frustrated caller rather than someone in genuine distress. Relying solely on human judgment to identify vulnerability is neither scalable nor sufficient.
Energy and utilities remain the top source of financial pressureFinancial pressures, particularly rising energy and utility costs, weigh heavily on UK households. A troubling 35% of potentially vulnerable consumers anticipate reducing or stopping their heating and hot water usage in 2025 due to financial strain.
With financial difficulties impacting consumers across all demographics, organizations—especially energy providers—must adopt solutions that build customer confidence and help consumers easily access critical information.
Vulnerable consumers are choosing digital supportVulnerable consumers are increasingly turning to digital channels for support. Over a third (37%) prefer organizations to invest in improved digital services, such as AI-powered chatbots, over traditional in-person support, surpassing the general population’s demand (33%).
Digital channels provide an added layer of anonymity, which can be especially empowering for vulnerable individuals hesitant to discuss sensitive issues face-to-face. This presents a significant opportunity for organizations to leverage intelligent solutions that help customers resolve their issues efficiently and accurately.
AI and automation: the key to scalable, compassionate supportWith a growing number of consumers at risk, outdated manual processes can’t keep up. Supporting vulnerable consumers at scale requires innovation. AI and automation can transform how organizations detect and respond to vulnerability, ensuring no one is left behind.
AI-driven solutions can analyze every customer interaction across voice and digital channels, detecting vulnerability in real-time based on language cues, sentiment, and behavioral patterns. This allows for timely intervention and ensures that customers receive the right support when they need it the most.
AI-powered chat services must go beyond surface-level interactions. Smart escalation pathways ensure that vulnerable consumers receive appropriate follow-up, whether through specialist advisors or seamless context capture—eliminating the need for customers to repeat distressing details.
However, AI insights are only valuable if they empower frontline advisors. Real-time AI guidance can equip agents with instant, tailored recommendations—whether offering alternative payment plans, government assistance, or mental health support options. This ensures that customers receive compassionate, personalized service without the risk of bias or oversight.
What’s more, by automating workflows, organizations can ensure vulnerable customers are always routed to the correct resources, specialist teams, or dedicated processes—minimizing the risk of anyone falling through the cracks.
The future of vulnerable customer supportVulnerability is a human challenge, but technology is needed to solve it at scale. AI doesn’t just detect vulnerability—it enables organizations to move beyond recognition, delivering proactive, personalized, and truly supportive experiences.
For technology leaders, the message is clear: AI and automation must be embedded at the core of customer support strategies. By working closely with customer service, technology leaders can ensure that every consumer, especially the most vulnerable, receives the support they need with dignity, efficiency, and care.
We've featured the best help desk software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Today’s organizations rely on an extensive network of third-party vendors, partners, and service providers to enhance operations and fuel innovation. Whether leveraging cloud services, supply chain partners, or outsourced IT solutions, these external dependencies introduce complex cybersecurity risks.
The 2024 Change Healthcare cyberattack exemplified the devastating consequences of a third-party vulnerability, exposing the personal and medical information of nearly 190 million individuals—the largest healthcare data breach on record. This incident underscored how deeply vulnerabilities in a single third-party provider can ripple across entire industries, exponentially expanding attack surfaces and amplifying the consequences of a single security failure.
The escalating threat of third-party cyber risksOne year after the Change Healthcare cyberattack, third-party breaches continue to dominate headlines, with new incidents emerging almost monthly. In January, government IT contractor Conduent suffered a cyberattack due to a third-party system compromise on an operating system. The following month, Grubhub disclosed a data breach after detecting unusual network activity linked to a compromised third-party service provider. These incidents are not isolated; they reflect a growing trend where cybercriminals exploit a single point of entry to infiltrate one or more organizations' entire digital supply chain.
The repercussions of a third-party cyberattack extend far beyond immediate operational disruptions. They erode customer trust, trigger scrutiny from officials, and result in significant financial losses. The evolving threat landscape coupled with businesses expanding their reliance on external vendors increases the potential for third-party security failures, making it imperative for organizations to rethink their approach to vendor risk management. Third-party risk management (TPRM) is no longer a compliance exercise, it is a business-critical function requiring continuous oversight and modernization.
The shortcomings of traditional TPRM approachesHistorically, organizations have relied on manual assessments to evaluate third-party risks, often involving lengthy security questionnaires, periodic audits, and contractual agreements outlining cybersecurity expectations. While these measures establish a baseline for vendor security, they are largely static and offer little real-time insight into evolving threats. As cybercriminals become more sophisticated and exploit new vulnerabilities within days of being discovered, a point-in-time assessment is no longer sufficient.
The increasing volume of vendor relationships further complicates manual risk management. Security teams are often overwhelmed by the sheer number of third parties they must monitor, leading to inefficiencies, delays, and gaps in visibility. Traditional approaches rely on periodic assessments that provide only a snapshot, leaving organizations blind to threats that can emerge between evaluations.
Without continuous oversight, security gaps can go undetected until it’s too late. Addressing these shortcomings requires a shift from manual, reactive processes to automation-powered security operations, where real-time monitoring and AI-driven analytics provide the agility needed to stay ahead of evolving threats.
How AI and automation-driven security is transforming TPRMAI and automation should not replace human decision-making; but rather augment it, empowering security teams with the tools and information needed to make better, faster, and more informed choices. A well-implemented AI and automation-powered strategy reduces operational fatigue, optimizes resource allocation, and ensures organizations stay ahead of evolving cyber threats rather than constantly playing catch-up. By automating TPRM, organizations can shift from passive risk management to proactive threat prevention.
Unlike traditional risk assessments that provide a static view of a vendor’s security posture, automation and AI can continuously monitor third-party networks, applications, and behaviors to identify anomalies and provide real-time visibility of external threat environments. AI-based third-party risk detection can also help organizations progress beyond known, rule-based security risk detection to a more heuristic detection capability.
While the risk of AI hallucinations and associated false positives can still be an issue, this is an emerging field for detecting software and network vulnerabilities that should not be overlooked. This proactive approach helps organizations move away from reactive security models, allowing them to address risks before they become crises.
Automation further strengthens incident response. When a security event occurs within a third-party environment, automation platforms accelerate containment by instantly analyzing the breach, assessing its impact, and triggering efficient notification of the appropriate practitioners which can be used to engage response protocols quickly and accurately. This rapid intervention significantly reduces dwell time, limiting the potential damage caused by an attack.
An automation platform with robust case management capabilities and highly customizable playbooks provides a centralized location for storing valuable information about TPRM-associated tasks, detections, software in use in the organization, asset criticality, and more. This helps not only in the defense of an environment but also can be leveraged for compliance audit readiness or demonstrating to insurers and stakeholders what measures have been taken to manage third-party risk.
The time for action Is nowThird-party data breaches, such as the recent GrubHub cyberattack, act as a wake-up call for organizations to prioritize proactive security measures. Cybercriminals will continue targeting external providers as a backdoor into organizations, reinforcing the need for a proactive, AI-enhanced approach to TPRM.
By integrating AI and automation-driven security operations, organizations can achieve real-time monitoring, automated threat detection, and rapid incident response, detecting anomalies before they escalate into full-scale breaches. In an era where cyberattacks are inevitable, resilience is built on preparedness. The time for action is now before your organization becomes the next headline.
We've featured the best business VPN.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Wednesday's puzzle instead then click here: NYT Connections hints and answers for Wedneday, March 19 (game #647).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #648) - today's words (Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #648) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #648) - the answers (Image credit: New York Times)The answers to today's Connections, game #648, are…
I used up three Mistakes today by convincing myself that VOCAL belonged in KINDS OF CORDS, trying every combination and getting “one away” each time before giving up and dropping it.
All part of the fun of Connections and hopefully I wasn’t the only person who fell for this trap.
This little niggle out of the way, the rest of the groups fell together easily. I might have even have gotten THINGS IN BOTTLES if I hadn’t completed OUTSPOKEN ahead of it.
How did you do today? Let me know in the comments below.
Yesterday's NYT Connections answers (Wednesday, 19 March, game #647)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.