Editor picks
“Blind AI deployment leads to knowledge loss and software failures”
Artificial intelligence is rapidly being integrated into business pro...
The future of generative AI in software testing
Cloud is for everyone, but not every single thing. This much we know....
ASML to build large new campus in Eindhoven
Space for 20,000 new ASML employees
Play Store revamp for developers: lower fees, more choice
Google has announced a thorough overhaul of the Play Store business m...
"*" indicates required fields
Story timeline
AI neocloud Nebius receives $2 billion investment from Nvidia
Nvidia and Nebius announced a strategic partnership today. Nvidia is investing $2 billion in the AI neocloud,...
The Zero-Drift Frontier: Modern Edge Demands on Kubernetes
Edge computing has come to the fore. Too often, edge computing gets confused with the Internet of Things (IoT...
Amazon Web Services expands Security Hub for multicloud security
Amazon Web Services has expanded Security Hub with new capabilities designed to bring together security opera...
JFrog: How to leap along the AI workflow tightrope
The pace of software development has never been faster. It is currently fuelled in no small part by the race ...
Windows Hello gets passkey support for Entra accounts
Microsoft is working on a new way for users to sign in to Microsoft Entra on Windows devices. The company is ...
Amazon calls engineers together after AI-related outages
Amazon is calling engineers together after a series of outages involving AI coding tools. From now on, junior...
SUSE may be sold again
Investment company EQT is exploring options for selling software company SUSE. According to insiders, a trans...
ASML to build large new campus in Eindhoven
Space for 20,000 new ASML employees
Meta acquires Moltbook, social network for AI agents
Meta is buying Moltbook, the experimental social network built exclusively for AI agents. On the platform, AI...
Veeam officially launches its HPE Morpheus VM Essentials support
Veeam Data Platform now supports agentless, host-level, image-based backup for HPE Morpheus VM Essentials Sof...
Ericsson breach: voice phishing call exposed over 15,000 records
A vishing (voice phishing) attack on a third-party vendor supporting Ericsson's US operations exposed data on...
When is an SBOM not an SBOM? CISA’s Minimum Elements
In August 2025, CISA (the US Cybersecurity Infrastructure & Infrastructure Security Agency) published new...
Salesforce makes Contact Center much more effective with Agentforce
Voice, digital channels, and CRM in one package
Polarise considers 30-megawatt AI data center in sovereignty push
German technology company Polarise has announced plans to build a new data center specifically designed for a...
Budget no longer an obstacle to AI automation
Budget is hardly an obstacle to AI automation anymore. Only 15% of IT decision-makers see costs as a bottlene...
OpenAI announces acquisition of AI testing startup Promptfoo
OpenAI aims to expand its security and testing capabilities for AI applications through the acquisition of Pr...
JetBrains Air: agentic development environment in preview
JetBrains launches Air, an agentic development environment that allows developers to control multiple AI agen...
Claude Code gets tool for checking code
Anthropic introduces Code Review for Claude Code. This multi-agent system thoroughly analyzes every pull requ...
HPE wants to be able to adjust prices after submitting a quote
Hewlett Packard Enterprise has amended its contract terms so that it can change the price of hardware after a...
First factory for InP photonic chips on 6-inch wafer scale in the Netherlands
Construction has started in Eindhoven on the world's first industrial factory for indium phosphide (InP) phot...
The future of generative AI in software testing
Cloud is for everyone, but not every single thing. This much we know. Generative AI is certainly also for eve...
Dataiku introduces platform for scalable enterprise AI
Today, Dataiku is launching the "Platform for AI Success," an expansion of its enterprise AI platform. With t...
AMD is giving its embedded chips 80 TOPS of AI compute
AMD is expanding its Ryzen AI Embedded P100 Series with new processors offering up to 12 Zen 5 cores, 80 syst...
MariaDB acquires GridGain for agentic AI data
MariaDB acquires GridGain Systems, the creator of open source Apache Ignite. The combination of MariaDB's rel...
Mass attack by Russian hackers on Dutch military personnel and civil servants
The MIVD and AIVD warn of an active Russian hacking campaign targeting Signal and WhatsApp accounts of Dutch ...
Sovereign: the new normal for AI and cloud native (and how to make it work)
As we head into KubeCon 2026 in Amsterdam, the word we keep hearing in our European travels is sovereign. ...
Microsoft 365 E7 unveiled: biggest licensing change in ten years
Microsoft has confirmed to Techzine that it will be launching the Microsoft 365 E7 Frontier Worker Suite on M...
New npm browser npmx addresses shortcomings of npmjs
An initiative within the JavaScript community is attempting to offer an alternative to the way developers vie...
Google CLI simplifies Workspace for AI agents
Google has published a new command line tool on GitHub that simplifies the use of Gmail, Drive, and other Wor...
Nscale sets European record: 2 billion raised in funding round
UK-based AI infrastructure company Nscale has closed a $2 billion Series C round. It's the largest in Europea...
OpenAI unveils Codex Security to detect vulnerabilities in AI code
OpenAI is introducing a security tool for software development called Codex Security. The application, which ...
“Blind AI deployment leads to knowledge loss and software failures”
Artificial intelligence is rapidly being integrated into business processes, driven by promises of efficiency...
Anthropic launches Claude-powered app marketplace without taking a cut
Anthropic has launched the Claude Marketplace, an enterprise store where customers can buy Claude-powered sof...
Fake installation pages Claude Code spreads infostealer
Security researchers at Push Security have discovered a new technique they call InstallFix. Attackers clone i...
Windows Terminal 1.24 focuses on extensions and search
Microsoft has released Windows Terminal 1.24 and previewed version 1.25. The stable version introduces a new ...
A decade of Cloud Native at ING: Lessons learned, and what comes next
ING’s private cloud has been around for over a decade, and its cloud native portfolio is approaching almost...
2025 was a new record year for ransomware
The number of ransomware attacks worldwide rose by 50 percent to nearly 7,900 incidents in 2025, according to...
OpenAI launches GPT-5.4: reasoning, coding, and computer use in one
OpenAI's latest model sounds like a jack of all trades. GPT-5.4 follows very closely on the heels of GPT-5.3 ...
China and spyware companies dominate zero-day attacks
Attacks exploiting zero-day vulnerabilities in enterprise technology reached record levels in 2025. Cyber esp...
Pentagon labels Anthropic a supply chain risk
The US Department of Defense has officially designated AI company Anthropic as a risk to the US supply chain....
Palo Alto and SentinelOne founders launch security company Cylake
Cybersecurity startup Cylake has raised $45 million in seed funding to develop a security platform that runs ...
“AI chips will remain in America unless foreign countries invest in the US”
A significant restriction on AI development outside the US is looming. The US government is considering restr...
Red Hat makes Ansible the execution layer for agentic AI systems
Ansible plays pivotal role in Cisco's full-stack approach
How phishing service Tycoon 2FA went under
Success for coalition of Europol and security players
To make vibe coding viable, Pega Blueprint adds robust controls
Blueprint is Pegasystems' take on AI-infused enterprise app development. With additional updates, it has now ...
Calls for a ‘Chinese ASML’ are growing louder, but it is still a long way off
Lithography should be central to the Chinese government's next five-year plan, according to several top execu...
Cisco details further vulnerabilities in Catalyst SD-WAN Manager
Cisco has disclosed five vulnerabilities in Catalyst SD-WAN Manager, two of which are being actively exploite...
Advancing Europe’s public agenda through Open Source Software Foundations
Digital products & services shape almost every sector of modern life. They have become an important backb...
Broadcom: AI companies currently dependent on external chipmakers
Broadcom says that big AI companies and hyperscalers can't develop and produce their own chips at scale for n...
Play Store revamp for developers: lower fees, more choice
Google has announced a thorough overhaul of the Play Store business model. Developers will have greater choic...