TechRadar is dedicated to helping you choose the best software tools. Hence, I reviewed one of the most popular torrent clients to help you decide if it’s worthwhile.
You might have heard of Vuze, formerly called Azureus. Its name frequently appears when people search for torrenting clients on Google and across the web. I tested the app extensively to judge whether it lives up to its fame. Read on to learn about its features, pricing, security, user-friendliness, and other crucial factors.
Vuze: PricingI’ve tested endless torrenting clients, and many of them are completely free. However, Vuze is not. It has a free version that includes ads (which I often found annoying), but an ad-free interface requires paying $3.99 monthly for Vuze Plus.
To be fair, Vuze Plus includes other features like DVD burning and the ability to play media files while they’re still downloading. Yet, I’m not a fan of paying for a torrenting client when many free alternatives are available.
Vuze: VersionsVuze is available on the three major desktop operating systems: Windows, macOS, and Linux. But, something feels odd about this app. It was officially released in 2017, and development seems to have stalled since then.
Vuze used to have an Android app available on the Play Store, but I checked endlessly for it and found none. The app was removed from the Play Store for unclear reasons, making it only accessible by directly downloading the APK file. I think the APK process is too much work for the average user.
(Image credit: Future)Vuze: FeaturesVuze is a feature-rich torrenting client whether you’re using the free or paid version. The free version includes a search bar to find torrents right from the app. This feature is important because many torrenting clients don’t provide help in finding .torrent files to download. Instead, you’ll have to visit an external site to get the files.
The search feature is split into a torrent search and web search. The former encompasses .torrent files stored on Vuze’s database, and the latter helps you find .torrent files across the web. For instance, if you search for Jazz music, you can view torrent files for them across the web or the results directly from Vuze’s database.
If you have the relevant .torrent file already installed on your PC, you can add it to Vuze and begin the download. The .torrent file contains the metadata of the larger file you want to download, and Vuze quickly begins the process.
You can also download torrents via their magnet links, which are hyperlinks containing the metadata of the relevant file. Paste this link into Vuze, and it’ll quickly begin downloading the file.
Likewise, users can download files by providing the torrent hash. I liked that Vuze offers flexible ways to discover and download .torrent files. I encountered variable speeds when downloading content from this app. Some files downloaded much faster than others, likely due to the availability of more seeders for those files.
(Image credit: Future)Seeding in torrenting is the process of uploading a file for other users. When you download any content on Vuze, you automatically become a seeder uploading that same content for other users. That’s how the network maintains enough capacity to offer reliable downloads for users. Uploading content can consume considerable bandwidth, so Vuze lets you cap your upload speed to conserve bandwidth.
Though downloading the APK file for the Android app seemed tedious, I had to do it to provide a rigorous review. After setting it up, I used it to control torrent downloads on my PC. The Android app lets you start, stop, and pause downloads remotely from any location. For instance, you can be at work and control downloads on your home PC.
I enjoyed testing Vuze Plus even if I wish I didn’t have to pay for the extra features. It includes a built-in DVD player that lets users play media directly while downloading. I couldn’t wait to watch my favorite movie when downloading, so I had to press that play button.
Vuze Plus also removes ads, which I mostly found distracting. I’m not a fan of ads, so maybe that’s why I found them annoying. However, I think an average user can easily tolerate and ignore the ads on the free Vuze version.
Vuze has an outstanding feature called Swarm Discoveries. This feature searches for similar content based on what you've previously downloaded on Vuze, akin to an algorithm recommending related content to download. It recommends related content that you may enjoy, helping you discover the best movies, music, and more at no cost.
Vuze: Interface and in-useI didn’t have issues navigating Vuze’s interface on the desktop and Android apps. It’s a well-designed app with a modern, sleek interface. The features are arranged on the left, and the main dashboard is on the right.
Vuze is a lightweight app that didn’t consume significant computing resources, which I can’t say for many torrenting clients. Some clients I’ve tested hijacked my PC’s resource space and left little room for other apps, but not Vuze.
However, I think Vuze has a steep learning curve for the average person. You’ll likely need some time to get used to its numerous features.
Vuze: SecuritySecurity is paramount when using any torrenting client. ISPs don’t like torrenting and often want to identify users downloading torrents. Hence, you should switch on a VPN before downloading torrents to protect yourself from third-party snooping.
I liked that Vuze Plus has a built-in antivirus scanner (based on Bitdefender). This tool scans all incoming torrents for viruses and alerts you if any are detected. It’s vital, given that torrents are a common vector through which malicious actors spread malware.
Vuze: Final VerdictI enjoyed Vuze’s feature richness and user-friendliness. I have some complaints, such as the free version including distracting ads, but we don’t always get what we want. Overall, I’ll recommend Vuze as a torrenting solution for everyone.
It sounds like science fiction: “Could AI run for president?” But as someone who’s spent decades building software systems that prevent failure in high-stakes environments, I believe we’re approaching a moment when this question won’t sound ridiculous—it will sound inevitable.
By 2032, AI tools won’t just be answering our questions or drafting our emails. It will be deeply embedded in the systems that shape our lives: our healthcare, our education, our justice systems—and yes, even our governance. I’m not saying we’ll elect a robot to office. But I am saying that an AI might be the most impartial, consistent, and evidence-driven decision-maker in the room.
Let me explain.
What Software Taught Me About Broken SystemsBuilding software that anticipates failure taught me to look beyond surface-level issues and ask what’s really driving breakdowns—whether in code or in government. That’s what data and AI do best: find meaning in complexity.
Around 2019, I began to notice a deeply unsettling pattern—one that had nothing to do with code. Public trust in governments was collapsing. Democracies were paralyzed by short-term incentives, disinformation, and gridlock. Meanwhile, leadership decisions were increasingly detached from facts, drowning in emotion and noise.
I found myself asking the kind of question that gets you strange looks at dinner parties: What if AI could help us govern better than we govern ourselves?
AI Isn’t Perfect—But Neither Are WeWhen people talk about AI, they usually split into two camps: utopians who believe it will save us, and doomsayers who fear it will destroy us. But I’ve worked closely with AI systems. I know what they can do—and what they can’t.
AI doesn’t have desires. It doesn’t seek power. It doesn’t fear losing elections or gaining popularity. It doesn’t lie to protect its ego.
That’s not just a limitation. It’s also a strength.
Humans bring empathy, values, and creativity—but also bias, ego, and self-interest. AI, when designed ethically and transparently, brings clarity, consistency, and impartiality. It can help us make data-driven decisions that aren’t held hostage by emotion or lobbyists.
The realization hit me hard: for decades I’ve used technology to reduce failure in software. Couldn’t we use the same thinking to reduce failure in leadership?
What Changed My ThinkingI started imagining a governance model where AI doesn’t replace politicians—but augments them. A system where AI:
- Flags inconsistencies in laws.
- Predicts the impact of policy across different demographics.
- Helps allocate resources more equitably.
- Identifies disinformation in real time.
In short, AI wouldn’t run the world. It would help us run it better.
That’s why I coined the term AICracy—a system where AI assists governance with transparency and ethical guardrails, proposing evidence-based ideas for human leaders to shape, debate, and vote on. It’s not automation of politics. It’s optimization of decision-making.
What I’ve Learned—and What You Can Take AwayOver the years, I’ve come to believe that AI won’t undermine leadership—it will elevate it, if we let it. Here are a few principles I live by:
1) AI is only as good as the humans guiding it
Like steel, AI can build bridges or swords. It’s up to us to embed values, ethics, and context into the system.
2) Don’t see AI as a competitor—see it as an amplifier
It won’t replace human intuition. But it can scale clarity and reduce noise in overwhelmed systems.
3) Fairness is a systems challenge, not just a moral one
AI can analyze patterns of inequality and help us intervene—if we’re bold enough to use it.
4) AI can’t make moral decisions—but it can support more moral systems
Human oversight is critical. The goal isn’t to escape responsibility, but to deepen it—with better tools.
Where It’s All HeadedOut of curiosity, I recently asked ChatGPT and Gemini how they envision themselves evolving by 2032. Their answers startled me—not because they were outlandish, but because they aligned with what I already suspected:
By then, AI will be more transparent, accountable, and aligned with human values. It will help governments, companies, and communities reason across massive complexity in real time. It won’t just provide answers—it will become a collaborator in solving society’s hardest problems.
The question won’t be “Can AI govern?”
It will be: “Why would we keep governing without it?”
We’re not electing an AI president—yet. But by 2032, we may trust one to help us decide how to govern better. That, to me, is not far-fetched. It’s necessary.
We list the best AI chatbot for business.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Artificial intelligence continues to fundamentally change how we do business, and in the past year, a new innovation has entered the spotlight. AI agents are being adopted at record speed across organizations, from marketing to data management to customer service, with the promise to streamline decisions, engage customers and boost productivity for companies to drive business value.
We’ve seen AI agent launches from companies across all sizes and industries. In May, Google announced it would incorporate AI agents in its searches, while Microsoft also announced a plan to use AI agents to help its users search the web. The use of AI agents is surging across industries, from finance and healthcare to car dealerships.
In fact, Boston Consulting Group predicts that the market for AI agents will grow at a 45% CAGR over the next five years. Gartner has also estimated that 80% of common customer service queries will be resolved by AI agents in less than five years.
But here’s the catch: agents are only as good as the data they run on.
Why Data Still Trips Up AINo matter the cutting-edge nature of the AI tool or its sky-high promises, one constant remains when it comes to the data they’re operating on: garbage in, garbage out.
Companies racing against competitors to deploy AI agents without taking a step back to evaluate the sources they’re operating on face a major risk—if those agents rely on fragmented or inaccurate data, they won’t perform as expected. Even the most capable AI systems can’t deliver results if they’re built on bad information.
According to MIT Technology Review Insights, 78% of global companies are not ready to deploy AI agents and LLMs. What’s stopping them? Their data is not prepared to support AI. At the core of AI’s success is unified, accurate and real-time customer data.
When AI agents are powered by bad, disjointed data, the consequences can be costly. Last year, Air Canada was forced to reimburse a customer when its chatbot promised a discount that didn’t exist. And, in April, a tech company suffered fallout after a customer service agent’s mistake resulted in a wave of canceled subscriptions.
These types of mishaps can threaten customer loyalty and result in churn. AI agents are only as smart and useful as the data on which they’re built. In order to trust your AI agent, you have to trust your data foundation.
Identity Resolution, Reimagined for AgentsThe most essential—and most overlooked—piece of making agentic AI work is identity resolution. Without a clear, accurate view of who the customer is across historically disconnected and fragmented systems, agents are flying blind.
That’s changing. AI agents can now take on identity resolution as part of their function, matching records in real time, continuously refining connections and operating without brittle rule-based systems. Rather than depending on static, one-size-fits-all profiles, agentic identity resolution builds a living picture of the customer, improving with each interaction and fostering enhanced productivity and accuracy.
This means fewer errors, less time-consuming manual data prep and faster time-to-insight for every downstream system.
Getting the Data Foundation RightBefore AI agents can operate effectively, the underlying data must be:
Unified: Data from every touchpoint, ranging from eCommerce and CRM to customer support, should be stitched together into a single, accessible layer that’s usable for marketing and engineering teams alike.
Accurate: Identity resolution must reconcile inconsistencies or duplicates across multiple channels and touchpoints to build a reliable profile.
Contextual: Different use cases need different views. Marketing might need probabilistic profiles for broad targeting, while support needs deterministic, single-session accuracy.
Governed: Access controls, human oversight, feedback loops and consent tracking are table stakes for compliant and trustworthy AI – especially in the wake of evolving privacy regulations.
A modern lakehouse architecture, paired with AI-native tools for identity resolution and customer profile building, can drastically reduce the manual effort required and make real-time, AI-powered decisions viable.
Data as Competitive DifferentiatorOften, data quality is treated like plumbing, which is necessary but invisible. But in the age of AI agents, it becomes a competitive asset.
High-quality, agent-ready data enables better personalization, faster experimentation and safer automation. It allows AI to act with confidence, knowing who it's interacting with, what they want and how to best respond efficiently and effectively.
When done right, data doesn’t just support AI - it elevates it.
What’s NextAgent-based AI is already reshaping expectations for responsiveness, personalization and automation. But the true breakthrough isn’t in the models, it’s in the data.
The companies that invest in a high-quality data foundation now will be the ones who make AI useful, reliable and transformative for not only their operations, but also for the end customer experience. That’s the difference between a flashy interface or a top-notch algorithm and an impactful, scalable solution.
Before you build your next agent, build the data foundation it needs.
We list the best customer experience (CX) tool.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The UK government's designation of data centers as Critical National Infrastructure (CNI) underscores their vital role in national operations and economic stability. This recognition comes with increased scrutiny and highlights the need for robust cybersecurity, especially in the face of escalating global threats.
While significant investment is pouring into the UK data center sector, a critical question remains: how much of this addresses the often-overlooked cybersecurity risks associated with Operational Technology (OT) and Internet of Things (IoT) devices?
The Achilles' Heel: OT/IoT SecurityData center operators have traditionally prioritized IT security, safeguarding valuable data from cyber threats by focusing on data center connectivity and server infrastructure. However, critical OT systems responsible for building automation, cooling, power, safety, and physical security often lack the same level of protection and are often not accounted for at all.
These systems, crucial for maintaining the physical functionality of data centers, become interesting targets for attackers if left unsecured, often being used as initial points of access and presence in Data Centre networks. This risk is underscored by the fact that many of these systems are more connected to data center networks and even the internet than security teams realize, while often lacking basic cyber security hygiene like operating system updates, secure credentials, and network monitoring.
Similarly, IoT devices like IP cameras, digital displays, fire suppression systems, and biometric access controls, while enhancing safety and physical security, introduce a complicated additional attack vector for security team to account for. Like OT systems, these devices often use stripped down, embedded operating systems that lack critical cyber security functions making them a relatively easy target for compromise.
Real-World VulnerabilitiesThere are now numerous known public examples of OT/IoT vulnerabilities being exploited in data centers and similar environments, and likely many more compromises that are not disclosed or even remain undetected. IP cameras have been hijacked for botnet attacks, launching large-scale DDoS attacks. Building management systems have been compromised for unauthorized activities like crypto mining, impacting system stability and risking failure with dangerous levels of resource utilization.
Even when not targeted for direct impact, OT and IoT devices are often ‘soft’ targets threat actors can use for sustained presence in even otherwise secure networks that have invested heavily in IT cyber security. These incidents highlight the very real dangers of neglecting OT/IoT security. Ignoring these vulnerabilities is like leaving the keys to your data center under the welcome mat.
Bridging the Gap: A Focus on OT/IoT Visibility and SecurityEffectively securing OT/IoT environments requires a different approach than traditional IT security. It starts with gaining complete visibility into these often-forgotten systems. Data center operators need to know what devices are connected, how they communicate, and what vulnerabilities they introduce.
This requires specialized tools designed for OT/IoT environments, capable of identifying and profiling industrial control systems, building and IT automation devices, and other connected assets. This likely also requires monitoring wireless communications as well, as many IoT devices are connected via site WiFi networks or IoT connectivity solutions like LoRa or cellular.
Once visibility is established, continuous monitoring and threat detection are crucial. Real-time asset management allows operators to track every connected device, identifying unauthorized or anomalous behavior before it escalates into a major incident.
This includes monitoring network traffic for suspicious activity and implementing anomaly detection systems tailored to OT and IoT protocols. Something as simple as identifying an IoT device like a camera attempting to communicate with the data center server infrastructure could be indicative of a compromised device.
Collaboration and Best Practices: A shared responsibilityWhile the responsibility for securing data centers ultimately rests with the operators, collaboration between the government and the private sector is still essential. Government initiatives like the NCSC's Active Cyber Defence (ACD) program provide valuable resources for threat identification and response. And, industry collaboration and threat intelligence sharing, as advocated by the World Economic Forum, are crucial for staying ahead of sophisticated attackers.
Data center operators must prioritize OT/IoT security by:
As data centers become increasingly complex and interconnected, a holistic approach to cybersecurity, encompassing all of IT, OT, and IoT, is no longer optional – it's a necessity. Don't wait for a breach to expose the vulnerabilities in your OT/IoT infrastructure.
By taking simple, proactive steps, data center operators can significantly reduce their cyber risk and ensure the resilience of these critical facilities. Protecting your data is crucial, but protecting the systems that support your data is equally important. Ensuring that cyber security investment goes beyond IT and accounts for OT and IoT environments is critical to secure the foundation of your data center operations.
We've listed the best software asset management (SAM) tools .
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The Syrian government under interim President Ahmad al-Sharaa has been struggling to consolidate control since he led a surprise insurgency that ousted former President Bashar Assad in December.
(Image credit: Omar Sanadiki)
The five miners were trapped deep inside Chile's El Teniente mine on Thursday after a section of the mine collapsed following a 4.2 magnitude earthquake.
(Image credit: Esteban Felix)