94739 2020-02-23 07:45
Tesla sorprende tutti: la Gigafactory di Berlino si farà pur abbattendo 92 ettari di foresta
Coronavirus: Bill Gates contribuisce con 100 milioni di dollari
Microsoft sfrutta l'AI per migliorare la sicurezza del cloud ibrido
La Commissione Ue ora usa Signal: è più sicura di WhatsApp?
Un 'Mi Piace' a un contenuto antisemita o diffamatorio può essere un crimine in Svizzera
Le chiavi CarKey si potranno condividere via Messages
Mercedes: 15 mila licenziamenti per focalizzarsi sulle auto elettriche
Sconti Amazon incredibili solo nel weekend (oltre l'80%): aspirapolvere (-40%), Smart TV (-32%), Xiaomi, Apple, Huawei (-22%) e altro
Baby Yoda, Hasbro annuncia l'animatronic: ecco prezzo e data di uscita
Google Stadia adesso disponibile su diversi smartphone, tra cui Samsung Galaxy, Razer Phone e Asus ROG Phone II
Microsoft Defender, l'antivirus è in arrivo su iOS e Android: ecco a cosa servirà
Energy Way, modelli matematici innovativi per migliorare i processi di business
EZ Lab applica la blockchain al pomodoro Pachino
Vodafone porta sul mercato V-Home Mini: la soluzione per la casa ''smart'' a soli 1,99€ al mese
JPEG vuole usare l'AI per il prossimo standard di compressione
Microsoft sfrutta l'AI per migliorare la sicurezza del cioud ibrido
Hyperloop, inizia lo studio in Italia: tratta da Milano Cadorna a Malpensa in soli 10 minuti
Solo 5,99 euro al mese per 100GB di internet e chiamte illimitate: ecco la nuova super-offerta di Wind Tre
Le soluzioni HPC Lenovo: non solo on-premise
The Mandalorian: ILM ha rilasciato un video che spiega come sono stati realizzati i fondali con Unreal Engine
HTC annuncia tre nuovi visori Vive Cosmos e Vive Proton
Twitter pronta a dare battaglia alle fake news dei politici
iOS, rivoluzione in vista: app come Chrome e Gmail si potranno impostare come predefinite
KIOXIA, per prima, presenta SSD Enterprise PCIe 4.0 con interfaccia U.3 da 6,9GB/s
Commercialisti dopo la fattura elettronica: Wolters Kluwer Italia fa il punto della situazione
Windows 10, rilasciate le nuove icone colorate per i primi utenti: eccone alcune
Groupon corsi online: non smettere mai di imparare
[AGGIORNATA] Brexit: gli utenti di Google britannici potrebbero perdere la protezione dei dati personali del GDPR
Offerte Amazon, 21 febbraio: ecco tutti gli sconti (fino al 69%) su portatili, cuffie, aspirapolvere, iPhone, Galaxy
Porsche Taycan, nuovo record sul quarto di miglio per MotorTrend: battuta Tesla
Record di fatturato e utile per Lenovo nel terzo trimestre
AESVI non esiste più: diamo il benvenuto a IIDEA
Tesla, la nuova batteria da 110kWh potrebbe rompere il muro dei 640 km di autonomia
Brexit: gli utenti di Google britannici potrebbero perdere la protezione dei dati personali del GDPR
AESVI non esiste più: diamo il benvenuto a IDEA
Sony Xperia L4 ufficiale: ecco il nuovo smartphone entry-level con display 21:9
SAVI SERIE 8200, una sola cuffia per più dispositivi contemporaneamente
WD Black P10 e D10: cosa sono e a cosa servono gli hard disk "da gaming"?
Kingston riceve la certificazione NATO per le sue chiavette USB IronKey D300
MGM Resorts, online i dati di oltre 10 milioni di clienti
NYTF 2020: Ecco tutti i prodotti a tema Marvel di Hasbro
NYTF 2020: Ecco tutti i prodotti a tema G.I. Joe di Hasbro
Ecco i primi benchmark su un Core i9-10900, si tratta di un Engineering Sample
Final Fantasy XIV, il team non sarà presente al PAX East a causa del nuovo coronavirus
The Division 2, l'ultimo DLC contiene un riferimento a Splinter Cell
Star Trek Picard quinto episodio: Cronache di Stardus City. Tutti i riferimenti e le citazioni della saga di Star Trek
Lo standard PCI-Express 6.0 raggiunge la versione 0.5, arriverà nel 2021
Ghostbusters, da Hasbro la nuova linea Plasma Series
Capricorn Shura Myth Cloth EX, in arrivo la versione con colorazione manga
Half-Life Alyx, Valve rassicura: Index VR tornerà disponibile prima del lancio
Friends: a breve una reunion del cast per uno speciale su HBO Max!
PUBG, arriva finalmente il cross-play tra PS4 e Xbox One
Batman: The Animated Series Adventures, via al Kickstarter
Temperature alte sulle ASUS RX 5700 e 5700 XT? Basta stringere le viti
The Sims 4, un architetto riproduce nel gioco la casa del film Parasite
Samsung Galaxy Note 20: un brevetto anticipa il possibile design
Alice in Wonderland (Q-Posket) di Banpresto - la recensione
Huawei P40 potrebbe introdurre il Wi-Fi 6+
Batman Ninja - The Show, il cavaliere oscuro arriva a teatro
Tutto quello che c'è da sapere sull'utilizzo delle "voci digitali"
Xigmatek presenta Zeus Arctic, nuovo case open air
I Funko Pop di The Boys stanno per arrivare, con pezzi esclusivi da collezione
Star Wars Battlefront, EA cancellò nel 2019 un capitolo open world previsto per la next-gen
World of Horror a sorpresa su Xbox Game Pass per PC
Star Trek: gli eventi storici del futuro
Baldur's Gate 3, l'accesso anticipato inizierà nella seconda metà di quest'anno
Intel Comet Lake-S, avvistato il listino prezzi delle CPU
Kingston IronKey D300, la chiavetta cassaforte
The Mandalorian: rilasciato il primo trailer in italiano
Sonic di Hedgehog: The Rock sarà nel sequel?
The Marvelous Mrs Maisel e la stand-up comedy: donne sul palco
Smart TV, smartphone e altoparlanti Sony nelle offerte Solo per Oggi di MediaWorld
Animal Crossing New Horizons: nel gioco saranno presenti 383 abitanti
Gigabyte aggiorna i PC Brix con i processori Intel di decima generazione
I prezzi delle DRAM potrebbero salire nel corso di questo trimestre
rFactor 2 GT Pro e Challenge Series 2020, ecco i dettagli
Tekken World Tour 2020: annunciato l'inizio della stagione insieme ai dettagli
TUF Gaming GT301, da Asus un nuovo case per chi vuole giocare
Google Cloud, da oggi gli utenti potranno sfruttare la potenza delle CPU AMD Epyc
La U.S Navy userà CPU AMD Epyc nei propri supercomputer
PlayStation 5: una IA aiuterà i giocatori bloccati
Guida: i migliori auricolari true wireless
Fitbit, troppi dati nelle mani di Google?
AirPods Pro Lite: online nuove indiscrezioni
LG V60 ThinQ, render e possibili specifiche
Amazon apre lo store ufficiale dell'Inter
Modem libero: Assoprovider scrive a Mattarella
Google Maps, arriva il nuovo tab "Go"
MacBook Pro 13: presto con processore Ice Lake
Samsung Galaxy Z Flip, pop-up store a Milano
YouTube Music, upload della musica personale
Windows 10, le icone avranno un nuovo look
Coronavirus, Facebook e Sony assenti alla GDC 2020
HTC Project Proton, nuovo visore VR all-in-one
Play Store, rimosse 600 app con annunci invasivi
Il futuro della compressione JPEG è l'IA
Twitter testa funzione contro notizie fuorvianti
Apple: app di terze parti presto anche di default?
Microsoft Defender ATP anche per Android e iOS
Samsung Galaxy Z Flip contro le leggi della fisica?
Sony annuncia il nuovo Xperia L4 con schermo 21:9
Hisense presenta la smart TV A5820
Samsung Galaxy S20, fotocamere rivoluzionarie
Google Docs: Smart Compose correttore automatico
Zuckerberg si fa asciugare l'ascella dal suo staff
Huawei, i migliori tablet in offerta su Amazon
Samsung TV: presentata la gamma 8K anche in Europa
Per Samsung la TV sarà verticale
Panasonic Home Entertainment: i nuovi prodotti
Muore Larry Tesler, l'inventore del copia-incolla
TikTok: arriva il parental control
Gmail si rinnova: nuova barra di ricerca e filtri
Google revisionerà richieste di posizione di app
Twitter, ecco la funzione "continua discussione"
iPhone SE 2 appare su TikTok, ma è un falso
MacBook Air ricondizionati: le offerte su Amazon
DAZN: partite Serie A 2019/2020, 25^ giornata
Titan Security: la chiave di sicurezza di Google
Spotify testa i testi delle canzoni in tempo reale
Android 11 Developer Preview disponibile sui Pixel
Alero: la sicurezza passa dal controllo “forte” sugli accessi
Falla in Citrix interessa 80.000 aziende. E per ora niente...
Falla zero-day in Dropbox. Per ora c’è solo una patch provvisoria
Emotet fa strage in Germania. Francoforte bloccata per 24 ore
Attenti agli insider: spesso la minaccia arriva dall’interno
Il SIEM cresce e sfocia in altri servizi
Gangnam Industrial Style: attacchi a centinaia di aziende
IoT e certificati di sicurezza: bastano 3.000 dollari per violarne 435.000
Mozilla: autenticazione a due fattori obbligatoria per gli sviluppatori
Nuova tecnica ransomware: “pagateci, le multe del GDPR costano di più”
Nuova tecnica ransomware: “pagateci, le multe del GDPR costano di più”
I pirati nord-coreani di Lazarus adesso usano malware “in affitto”
Progetto Blackfin: F-Secure cambia la logica dell’intelligenza artificiale
Progetto Blackfin: F-Secure cambia la logica dell’intelligenza artificiale
Cina: addio a computer e software Made in USA in 3 anni
La cassetta degli attrezzi del bravo hacker
Mosca: i poliziotti vendono l’accesso alle telecamere di controllo
Falso WhatsApp su Google Play. E lo scarica 1 milione di utenti…
Una vulnerabilità nei sistemi Unix mette a rischio le VPN
BlackDirect espone alla violazione degli account Microsoft Azure
Hacker tentano un attacco 51% contro Vertcoin, ma ci perdono soldi
Emergenza StrandHogg: il nuovo exploit per Android già usato dai pirati
Database di TrueDialog espone milioni di SMS. E non solo…
RevengeHotels: attacchi mirati agli alberghi colpiscono anche l’Italia
Google: in 3 mesi dodicimila attacchi a Gmail da “hacker di stato”
Google: in 3 mesi dodicimila attacchi a Gmail da “hacker di stato”
Due SDK registrano informazioni di utenti Facebook e Twitter
Notifiche pericolose sui siti Web
Il prossimo futuro della sicurezza informatica
Decine di falle di sicurezza nelle applicazioni VNC
Otto temi trattati dagli esperti di Trend Micro per capire la sicurezza IT moderna
Black Friday e Cyber Monday: arriva la stagione di caccia per i cyber criminali.
Privacy: spunta un Web Tracker che non si può (quasi) bloccare
Falla nel plugin Jetpack per WordPress. Milioni i siti a rischio.
Una coalizione internazionale contro gli Stalkerware
Il futuro dello sviluppo dell'IA: una battaglia tra pregiudizio, etica e trasparenza
Microsoft introduce DoH su Windows 10
Attenzione ai dropper di nuova generazione: sfuggono ai controlli antivirus
Attenzione ai dropper di nuova generazione: sfuggono ai controlli antivirus
Cyber-spioni iraniani usavano una VPN “fai da te”. Brutto errore…
New Jersey Hospital Network Faces Lawsuit Over Ransomware Attack
Booz Allen Awarded $113m SEC Contract
US Cyber-flashers Could Get $1K Fine
UK Names and Shames Russia for Georgia Cyber-Attacks
GDPR Protection Will Continue After Google’s US Data Move, Says Lawyer
MGM Customer Data Has Been on Dark Web for Six Months
SIEM Still Creates Complexity and Administration Challenges
HP Joins Industry-Standards Initiative for Printer Security
Chinese Hackers Target Asian Betting Firms
Ransomware Wreaks Havoc Across Europe
Over 2000 UK Government Devices Go Missing in a Year
A Guide to Mastering Managed File Transfer
Cyber-Flashing on UK Trains Doubles
2020 Tax Season Attacks Already Targeting Small Businesses
Air Force Gives Students a Second Crack at Cybersecurity Certification
Medical Devices Intro Major Bluekeep Risk to Hospitals
AdSense Extortionists Threaten to Trigger Google Fraud Alarms
US Gas Pipeline Shut After Ransomware Attack
Intentional Malicious Insider Breaches Increased Between 2019 and 2020
Indian Arrested Over Sale of Illegal Drugs Disguised as Sex Aids on Dark Web
Dell in Talks to Sell RSA Cybersecurity Firm
US Teen Arrested Over Alleged Swatting and Cyberstalking
Iranian Hackers Backdoored VPNs Via One-Day Bugs
Remote Wipe Plugin Bug Affects Over 200,000 WordPress Sites
Two-Thirds of CISOs Struggling with Skills Shortages
New York Post Reporter Investigated Over Leak
Personal Data of 144K Canadians Breached by Federal Government
Six-Year-Old Brits Suspects in Sexting Offenses
IBM Confirms #RSAC Withdrawal Over Coronavirus Fears
PhotoSquared: App Leaks Data on Thousands of Users
UK Anti-Doping Agency Deflects 11,000+ Malicious Emails in Q4
Cyber-Attack Takes Down Redcar Council Services
Report Reveals Worst State for Healthcare Data Breaches in 2019
Chattanooga Cybersecurity Firm to Double Workforce
Alleged Source of Soccer Leaks to Stand Trial
US Slaps More IP Theft and Sanctions-Busting Charges on Huawei
US Education Non-Profit Leaks Data on Thousands of Students
US Chain Rutter’s Hit by POS Malware Dating Back to 2018
Puerto Rico Government Loses $2.6m in Phishing Scam
Report Finds Cybersecurity Issues with US 2020 Census
Microsoft Brings Defender Antivirus for Linux, Coming Soon for Android and iOS
Google Bans 600 Android Apps from Play Store for Serving Disruptive Ads
Adobe Patches Critical Bugs Affecting Media Encoder and After Effects
Cloud And Networking Certification Training ~ Get 97% OFF
You've Been Selected for 'Like of the Year 2020' Cash Prizes
Ring Makes 2-Factor Authentication Mandatory Following Recent Hacks
US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline Facility
Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide
Cynet Offers Free Threat Assessment for Mid-sized and Large Organizations
Page Not Found – The Hacker News
Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers
A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices
OpenSSH now supports FIDO U2F security keys for 2-factor authentication
U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies
500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users
Definitive 'IR Management and Reporting' Presentation Template
Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims
Update Microsoft Windows Systems to Patch 99 New Security Flaws
Adobe Releases Patches for Dozens of Critical Flaws in 5 Software
App Used by Israel's Ruling Party Leaked Personal Data of All 6.5 Million Voters
U.S. Charges 4 Chinese Military Hackers Over Equifax Data Breach
The Rise of the Open Bug Bounty Project
5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras
Exfiltrating Data from Air-Gapped Computers Using Screen Brightness
Prepare for Cisco, CompTIA, and More IT Certifications with this Bundle
Flaw in Philips Smart Light Bulbs Exposes Your WiFi Network to Hackers
This WhatsApp Bug Could Have Let Attackers Access Files On Your PCs
Google Accidentally Shared Private Videos of Some Users With Others
Hackers Exploited Twitter Bug to Find Linked Phone Numbers of Users
Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root
Hackers Put 30 Million Stolen Payment Card Details for Sale
Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers
Critical OpenSMTPD Bug Opens Linux and OpenBSD Mail Servers to Hackers
How to Clear Data Facebook Collects About You from Other Sites and Apps
Cynet Empowers IT Resellers and Service Providers to Become Fully Qualified MSSPs
New 'CacheOut' Attack Leaks Data from Intel CPUs, VMs and SGX Enclave
Zoom Bug Could Have Let Uninvited People Join Private Meetings
Interpol Arrests 3 Indonesian Credit Card Hackers for Magecart Attacks
Russian Pleads Guilty to Running 'CardPlanet' to Sell Stolen Credit Cards
250 Million Microsoft Customer Support Records Exposed Online
New Mexico Sues Google Over Collection of Children's Data
Google Removes 600 Android Apps for Displaying Disruptive Ads
Malware Attack Takes ISS World's Systems Offline
U.S. Combat Support Agency Discloses 2019 Data Breach
FireEye Spotted Over 500 New Malware Families in 2019
20,000 WordPress Websites Infected via Trojanized Themes
VMware Patches Serious Flaws in vRealize Operations for Horizon Adapter
Fraudulent Login Attacks Against Banks Surge: Akamai
Georgia Blames Russia for Cyberattack, US, UK Agree
RSAC 2020: Three Reasons Why the "Human Element" is a Timeless Theme
US, UK Blame Russia for 2019 Cyber Attacks in Georgia
Microsoft Threat Protection Now Generally Available
Cisco Patches Critical Flaw in Smart Licensing Solution
Over 400 ICS Vulnerabilities Disclosed in 2019: Report
Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform
Coming to a Conference Room Near You: Deepfakes
CrowdStrike Co-Founder and CTO Steps Down to Launch Nonprofit Policy Accelerator
ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business
Cometdocs Threatens Legal Action Over Disclosure of Security Issues
Ring Rolls Out Mandatory 2FA, New Privacy Controls
EU Proposes Rules for Artificial Intelligence to Limit Risks
Vulnerable Out of Band Consoles Put Industrial Assets at Risk
Trump 'Offered Pardon' to Assange If He Denied Russia Leak, Court Hears
WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins
Google Brings Titan Security Keys to More Countries
Huawei Loses Legal Challenge Against US Federal Purchase Ban
SentinelOne Achieves Unicorn Status After $200 Million Funding Round
ForgePoint Capital Announces $450 Million Cybersecurity Investment Fund
Operations at U.S. Natural Gas Facilities Disrupted by Ransomware Attack
Over 22,000 Vulnerabilities Disclosed in 2019: Report
ExtraHop Expands Enterprise IoT Security Features
Egnyte Launches New Content Visibility and Control Platform
Encryption Firm With NSA Roots Raises $10 Million
Google Removes Mideast Android App ToTok
Serious Vulnerabilities Expose SonicWall SMA Appliances to Remote Attacks
F-Secure Patches Old AV Bypass Vulnerability
Dell to Sell RSA Security Unit for $2 Billion
Rise in Malware Using Encryption Shows Importance of Network Traffic Inspection
Peripherals With Unsigned Firmware Expose Windows, Linux Computers to Attacks
Microsoft Trials Election Security Solution in Wisconsin
Is the Google Play Store Safe? Not Yet.
Haken Clicker and Joker Premium Dialer
All Things Mobile Security @RSA 2020
Plenty More Phish in the Sea….
Beware of the other virus – the spread of Coronavirus-themed Malware
“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign
Hamas Android Malware On IDF Soldiers-This Is How It Happened
Meeting the Security Needs of 31 Nations: R80 Receives 2 Common Criteria Certifications
January 2020’s Most Wanted Malware: Coronavirus-themed Spam Spreads Emotet Malware
January 2020’s Most Wanted Malware: Coronavirus-themed spam spreads malicious Emotet malware
Valentine's & Chocolate Don't Always Equal Love
What Are Serverless Functions: Three Revolutions Wrapped in One
Learn How Check Point Secured the Branch Office VMware SD-WAN™ for a Global Chemical Company
Check Point Research Brand Phishing report – Q4
Cut Your Security Operations Time By 60% with the New R80 Security Management-as-a-Service
Facebook is Most Imitated Brand for Phishing Attempts: Check Point Research’s Q4 2019 Brand Phishing Report
The Dark Side of Smart Lighting: Check Point Research Shows How Business and Home Networks Can Be Hacked from a Lightbulb
Check Point Delivers Unified Security Management as a Cloud Service to Cut Security Operations Time by 60%
The Dark Side of Smart Lighting: Check Point Research Shows How Business and Home Networks Can Be Hacked from a Lightbulb
Check Point Software Technologies Announces Expansion of Share Repurchase Program
Check Point Software Technologies Reports 2019 Fourth Quarter And Full Year Financial Results
Cloud Visibility Challenges
Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)
Check Point Research partners with Microsoft Azure to create a safer, better secured cloud infrastructure
Critical Vulnerabilities in Azure Cloud Infrastructure (Part II)
Zoom-Zoom: We Are Watching You
Check Point Research finds vulnerabilities in Zoom Video Communications, Inc.
Check Point Software Launches New Global Partner Program to Accelerate and Scale Channel Success
The Challenge of Compliance in the Cloud
Preventing Zero Day Attacks using MITRE ATT&CK Framework
Achieving Continuous Compliance at the Speed of Cloud
Cloud Native Security: What it Means
Use the Correct Tool for the Job: Mobile Management Solutions are Not Security!
Unlocking the data hidden in logs using MITRE ATT&CK Framework
Check Point Software Technologies Receives 2 New Common Criteria Certifications to Meet the Security Needs of 31 Nations
No Immunity from Cyber Attacks, Shows Check Point Research‘s Cyber Security Report
Helping you navigating the ever-changing security landscape: Check Point Research’s 2020 Cyber Security Annual Report
Taking Security to the Next Level with MITRE ATT&CK
Fast Track Your Network Security at CPX 2020
Check Point Software Fast Tracks Network Security with New Security Gateways, Giving Ultra-scalable, Power Efficient Protection against Gen V Cyber Threats
AWS Now Available from a Local Zone in Los Angeles
AWS Outposts Now Available – Order Yours Today!
Amazon EC2 Update – Inf1 Instances with AWS Inferentia Chips for High Performance Cost-Effective Inferencing
New – VPC Ingress Routing – Simplifying Integration of Third-Party Appliances
New for AWS Transit Gateway – Build Global Networks and Centralize Monitoring Using Network Manager
AWS Compute Optimizer – Your Customized Resource Optimization Service
AWS Transit Gateway Adds Multicast and Inter-Regional Peering
New – EBS Direct APIs – Programmatic Access to EBS Snapshot Content
AWS Fargate Spot Now Generally Available
Amazon ECS Cluster Auto Scaling is Now Generally Available
New – Provisioned Concurrency for Lambda Functions
New – AWS Step Functions Express Workflows: High Performance & Low Cost
AWS Launches & Previews at re:Invent 2019 – Tuesday, December 3rd
Amplify DataStore – Simplify Development of Offline Apps with GraphQL
AWS Launches & Previews at re:Invent 2019 – Wednesday, December 4th
Check out The Amazon Builders’ Library – This is How We Do It!
AWS Links & Updates – Monday, December 9, 2019
New – Amazon Comprehend Medical Adds Ontology Linking
Alejandra’s Top 5 Favorite re:Invent🎉 Launches of 2019
Celebrating AWS Community Leaders at re:Invent 2019
New – AWS IoT Greengrass Adds Container Support and Management of Data Streams at the Edge
Welcome to AWS IoT Day – Eight Powerful New Features
AWS Cloud Development Kit (CDK) – Java and .NET are Now Generally Available
Announcing AWS Managed Rules for AWS WAF
Safe Deployment of Application Configuration Settings With AWS AppConfig
22 New Languages And Variants, 6 New Regions For Amazon Translate
Visualize and Monitor Highly Distributed Applications with Amazon CloudWatch ServiceLens
New – Use Tag Policies to Manage Tags Across Multiple AWS Accounts
AWS Load Balancer Update – Lots of New Features for You!
New for Amazon Aurora – Use Machine Learning Directly From Your Databases
AWS DeepRacer Update – New Features & New Racing Opportunities
The Next Evolution in AWS Single Sign-On
AWS DeepComposer – Compose Music with Generative Machine Learning Models
New AWS Program to Help Future-proof Your End-of-Support Windows Server Applications
A New, Simplified, Bring-Your-Own-License Experience for Microsoft Windows Server and SQL Server
Automate OS Image Build Pipelines with EC2 Image Builder
Amazon Transcribe Medical – Real-Time Automatic Speech Recognition for Healthcare Customers
AWS Launches & Previews at re:Invent 2019 – Sunday, December 1st
Amazon Braket – Get Started with Quantum Computing
Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer