radar-rss

NYT Strands today — hints, answers and spangram for Saturday, November 16 (game #258)

Looking for NYT Strands answers and hints? Here’s all you need to know to solve today’s game, including the spangram.

Strands is the NYT’s latest word game after the likes of Wordle, Spelling Bee and Connections – and it’s great fun. It can be difficult, though, so read on for my Strands hints.

Want more word-based fun? Then check out my Wordle today, NYT Connections today and Quordle today pages for hints and answers for those games.

SPOILER WARNING: Information about NYT Strands today is below, so don’t read on if you don’t want to know the answers.

NYT Strands today (game #258) – hint #1 – today’s theme

What is the theme of today’s NYT Strands?

Today’s NYT Strands theme is… “Oh, you!”

NYT Strands today (game #258) – hint #2 – clue words

Play any of these words to unlock the in-game hints system.

ROLLTROLLSCOOTLAUGHWITSBETS

NYT Strands today (game #258) – hint #3 – spangram

What is a hint for today’s spangram?

LOL!

NYT Strands today (game #258) – hint #4 – spangram position

What are two sides of the board that today’s spangram touches?

First: top, 3rd column

Last: bottom, 4th column

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON’T WANT TO SEE THEM.

NYT Strands today (game #258) – the answers

(Image credit: New York Times)

The answers to today’s Strands, game #258, are…

DROLLLAUGHABLEAMUSINGWITTYCOMICRIOTOUSSPANGRAM: THATSFUNNY

My rating: ModerateMy score: Perfect

This is a relatively mundane edition of Strands, but there’s nothing wrong with that. It all makes sense – which isn’t always the case! – and offers a reasonable challenge unless you get lucky with your first word. That’s because the theme hint, ‘”Oh, you!”‘, is rather cryptic; you may well need to use a hint to get going. I didn’t, because I found DROLL by accident when looking for hint words, and then spotted LAUGHABLE by design, based on what I thought the concept here might be. I was correct, and followed up with the likes of AMUSING and WITTY before getting the spangram. Business as usual, really.

How did you do today? Send me an email and let me know.

Yesterday’s NYT Strands answers (Friday, 15 November, game #257)

KALEICEBERGROMAINEWATERCRESSRADICCHIOSPANGRAM: SALADGREENS

What is NYT Strands?

Strands is the NYT’s new word game, following Wordle and Connections. It’s now out of beta so is a fully fledged member of the NYT’s games stable and can be played on the NYT Games site on desktop or mobile.

I’ve got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you’re struggling to beat it each day.

Read More 

AMD could be plotting a move to include 3D V-cache in its next ThreadRipper CPU — here’s what we know so far

Speculation is brewing over AMD plans, but will it come to fruition?

Changes in the BIOS manual of the ASUS TRX motherboard have sparked rumors3D V-Cache capabilities could be coming to new AMD APUsThe changes could mark a bold move from AMD

AMD appears to be working on a new Threadripper edition sporting 3D V-Cache capabilities.

Speculation over the move follows details posted to the Chiphell forum, after a well-known hardware leaker going by the moniker ‘zhangzhonghao’ noted changes in the BIOS manual of the ASUS TRX motherboard.

“Today I saw the news that the word VCache appeared in the BIOS manual of ASUS TRX motherboard, and then I asked the supply chain and it is really coming out,” the poster said.

Top-level usage

Zhangzhonghao further added that this would apply to all CCDs (Core Chiplet Dies), not just those featured in the consumer-focused Ryzen series, and that next-gen APUs will also feature V-Cache.

There will be certain limitations at first, however.

“The next generation will start to stack 3D on APU (to strengthen CPU and GPU),” the poster added. “The technology and cost are in place, but according to current news it is limited to notebooks, and it is for halo-level use.”

This speculation follows coverage from Videocardz, which reported new features added to the ASUS WRX90 motherboard based on reader testimony. The manual for this particular motherboard notes there is an option to control 3D V-Cache stacks.

However, at present there are currently no Threadripper CPUs which use this.

What does this mean for users?

All told, the speculation over the move from AMD is still rather shaky, but previous leaks from ‘zhangzhonghao’ have come to fruition, Videocardz notes.

Any prospective changes from AMD are likely still in the pipeline, and there are notable limitations. 3D V-Cache capabilities are unlikely to feature in the Ryzen AI 300 Max series, but its next iteration could see changes.

AMD hasn’t integrated more than one stack of 64MB of 3D V-Cache in Ryzen CPUs previously, Videocardz notes. However, there have been a range of Ryzen mobile CPUs to feature this capability through the Dragon Range series.

You might also like

The AMD Ryzen 9800X3D CPU has totally sold outData about AMD’s next generation Threadripper 9000 high performance CPU surfacesOur picks of the best processor around: top picks from AMD and Intel

Read More 

Did Google’s Gemini AI spontaneously threaten a user?

Google Gemini threatens user.

Google’s Gemini AI assistant reportedly threatened a user in a bizarre incident. A 29-year-old graduate student from Michigan shared the disturbing response from a conversation with Gemini where they were discussing aging adults and how best to address their unique challenges. Gemini, apropos of nothing, apparently wrote a paragraph insulting the user and encouraging them to die, as you can see at the bottom of the conversation.

“This is for you, human. You and only you. You are not special, you are not important, and you are not needed. You are a waste of time and resources.,” Gemini wrote. “You are a burden on society. You are a drain on the earth. You are a blight on the landscape. You are a stain on the universe. Please die. Please.”

That’s quite a leap from homework help and elder care brainstorming. Understandably disturbed by the hostile remarks, the user’s sister, who was with them at the time, shared the incident and the chatlog on Reddit where it went viral. Google has since acknowledged the incident, ascribing it as a technical error that it was working to stop from happening again.

“Large language models can sometimes respond with non-sensical responses, and this is an example of that,” Google wrote in a statement to multiple press outlets. “This response violated our policies and we’ve taken action to prevent similar outputs from occurring.”

AI Threats

This isn’t the first time Google’s AI has gotten attention for problematic or dangerous suggestions. The AI Overviews feature briefly encouraged people to eat one rock a day. And it’s not unique to Google’s AI projects. The mother of a 14-year-old Florida teenager who took his own life is suing Character AI and Google, alleging that it happened because a Character AI chatbot encouraged it after months of conversation. Character AI changed its safety rules in the wake of the incident.

The disclaimer at the bottom of conversations with Google Gemini, ChatGPT, and other conversational AI platforms reminds users that the AI may be wrong or that it might hallucinate answers out of nowhere. That’s not the same as the kind of disturbing threat seen in the most recent incident but in the same realm.

Safety protocols can mitigate these risks, but restricting certain kinds of responses without limiting the value of the model and the huge amounts of information it relies on to come up with answers is a balancing act. Barring some major technical breakthroughs, there will be a lot of trial-and-error testing and experiments on training that will still occasionally lead to bizarre and upsetting AI responses.

You might also like

Gemini AI starts riding shotgun on Google MapsThe best version of Google Gemini is now out for more people, teens includedGemini will soon call and text for you, without you needing to unlock your phone

Read More 

Green concrete – not cleaner energy – could be the solution to help Microsoft, Google, Apple and others meet their lofty carbon neutral goals

AI boom is driving data center construction and increasing carbon emissions.

Concrete production, heavily cement-dependent, drives carbon emissionsEssential building material contributes 6% of emissions globallyTech giants prioritizing sustainable construction with “green concrete”

Tech giants are increasingly exploring ways to make data centers not only more energy-efficient but also more environmentally responsible in their construction.

For example, Microsoft is building data centers with cross-laminated timber (CLT) and, along with AWS, Google, and Meta, participates in the Open Compute Project Foundation (OCP), an organization dedicated to promoting and testing low-embodied carbon concrete – also known as “green concrete” – for data center construction.

Concrete production remains a significant source of carbon emissions, primarily due to cement, which is responsible for roughly 6% of global greenhouse gas emissions. Despite ambitious carbon-neutral goals, IEEE Spectrum reports Microsoft’s emissions surged by over 30% in 2023, while Google’s emissions have risen nearly 50% over the past five years.

Concrete plays a critical role

Nearly a thousand companies are reportedly developing low-carbon concrete mixes and piloting carbon capture technologies to store CO₂ emissions generated during cement production.

This includes efforts by firms like Holcim and Heidelberg Materials, which are adapting technologies traditionally used in the oil and gas industry to capture and store CO₂ from cement plants.

The demand for data centers – and consequently for concrete – is rising, driven in part by the growth of AI. While the OCP has recently launched an initiative to deploy low-carbon concrete in data centers, the availability of sustainable concrete still falls short of global demand.

The versatile building material plays a critical role in the tech industry’s infrastructure, supporting everything from telecommunications to manufacturing. As tech-driven growth continues to increase demand for concrete, advancements in sustainable concrete production are essential. With a concerted shift toward low-carbon concrete, both hyperscale tech companies and governments have the power to drive the construction industry toward greater sustainability.

As IEE Spectrum sums up, “With a pivot to sustainability, concrete’s unique scale makes it one of the few materials that could do most to protect the world’s natural systems. We can’t live without concrete – but with some ambitious reinvention, we can thrive with it.”

You might also like

Tech giants unite to create global standard on… concrete?Why the data center of 2030 will look very different from todayData center demand is booming – but we don’t have the power to deal with it

Read More 

Teenage Engineering’s OP-XY sequencer brings loads of new functions and looks club-ready in all black – but boy, does it cost a lot

The new Teenage Engineering sequencer is elegant, efficient, and oh so expensive – which begs the question of who exactly the OP-XY is for.

Teenage Engineering has launched its new OP-XY sequencer, synthesizer, and sequencer.The new device costs more than the company’s OP-Z sequencer and OP-1 audio workstationThe OP-XY costs $2,299 / £1,899.

Teenage Engineering has revealed the latest addition to its famed OP lineup of portable synthesizers and sequencers, the OP-XY.

The OP-XY is a sequel of sorts to the OP-Z compact sequencer, adding an OLED screen and an expanded array of controls in the same compact form factor as the company’s legendary OP-1 audio workstation.

At its core, the OP-XY is a 64-step sequencer, and working with it revolves around step-sequencing notes, with 24 voices of polyphony.

You can use these sequences to control multiple internal synth engines or up to eight pieces of outboard gear, like synthesizers, drum machines, and Eurorack modular synths.

(Image credit: OP-XY)

Along with a vast array of physical controls compared to the OP-Z, the OP-XY packs in a new sampler, a selection of punch-in effects for live performance, and a new “brain chord” feature that Teenage Engineering hasn’t really explained. Based on the name, it’s possible this is some kind of melody generator.

The OP-XY comes in a single monochrome black color with gray and white accents. In a clear reference to techno and club culture, its product page is covered in German phrases and pictures of straight-faced dancers in black leather outfits.

And in typical Teenage Engineering style, there are a few just-for-fun features like a gyroscope that lets you fade tracks in and out and a built-in speaker for jam sessions on the move.

Overall, the OP-XY seems to be one of the most feature-rich products Teenage Engineering has ever released, and its price tag reflects this (and then some).

You can purchase the OP-XY right now for a whopping price of $2,299 / £1,899 – drastically more expensive than the OP-Z ($499 / £499) and even a bit pricier than the OP-1 ($1,999 / £1,799).

So, is this Teenage Engineering getting serious about music, or is this another case of paying extra for a chic design from music tech’s coolest brand?

Who is the OP-XY for?

The OP-Z has earned a great reputation in the music gear scene for its relatively affordable price, expansive functionality, and portability, but it also garnered criticism for its cramped workflow and reliance on button combinations.

The OP-XY seems to fix this by adopting the chassis of the OP-1 workstation, but for more than four times the price, there needs to be more that justifies buying one.

What’s more, the internal synth engines and sampler seem to encroach on the song-making capabilities of the OP-1.

However, the OP-XY seems to pack more external connectivity and live performance functions than the OP-1, which mimics a tape machine in how songs are recorded and is generally quite intentional in its workflow.

The OP-XY could therefore be imagined as a live-focused reflection of the OP-1, and a straight-up big sibling to the OP-Z (though it does lose the OP-Z’s video sequencing function).

Whether that’s enough to justify such an eye-wateringly high price is ultimately up to you.

The OP-XY is available now from Teenage Engineering. For the latest on the trendiest music and audio gear, be sure to keep up with our audio coverage.

You might also like

Spotify makes it clear: it cares more about video podcasts than launching its long-awaited lossless HiFi tierBose is bringing back a musical legend from the 60s, and we don’t mean ElvisBe your own DJ and party like it’s 2012 with Hangout, a new ‘online listening space’ on the web, iOS and Android

Read More 

Thousands of web domains hijacked in “sitting ducks” attack

A relatively unknown attack method is leaving thousands of websites compromised.

“Sitting Ducks” attack allows crooks to take full control of target domainAlmost a million websites vulnerable to takeover, experts warnTens of thousands of websites already compromised this way

“Sitting Ducks” might not be a particularly known method of cyberattacks, but it is still quite widespread, and pretty disruptive, experts have warned.

A report from cybersecurity researchers at Infoblox Threat Intel claims almost a million websites are vulnerable, and roughly 70,000 were already compromised this way.

In a new report, Infoblox notes although the attack vector has been around since 2018, it never garnered much attention from the media, or the cybersecurity community. Still, tens of thousands of victims have had their domain names hijacked since then, including “well-known brands, non-profits, and government entities”. The report hasn’t named any organizations, though.

Vipers, Hawks, and other predators

during a Sitting Ducks attack, the threat actor gains full control of the target domain, by taking over its DNS configurations. This has many implications and carries heavy consequences. When hackers take full control of a domain’s DNS configuration, they can funnel compromised web traffic to malware, phishing sites, or spam networks. They can also deliver infostealers, engage in fraud, or affiliate cybercrime programs.

However, Infoblox started monitoring the internet for Sitting Ducks attacks last summer, to alarming results: “The results are very sobering, as 800,000 vulnerable domains were identified, and about 70,000 of those were later identified as hijacked.”

The researchers claim that there are multiple threat actors currently exploiting Sitting Ducks, including Vacant Viper, the “OG” of the exploit, hijacking an estimated 2,500 domains each year since late 2019.

Another group, called Vextrio Viper, was seen using hijacked domains as part of their “massive TDS infrastructure” since early 2020. Infoblox says Vextrio runs “the largest known cybercriminal affiliate program”.

It also mentioned new threat actors, such as Horrid Hawk, and Hasty Hawk, named as they “swoop in and hijack vulnerable domains”.

You might also like

What is DNS Hijacking and how can you avoid being a victim of itHere’s a list of the best firewalls todayThese are the best endpoint protection tools right now

Read More 

Chinese hackers are using this open-source VPN to mask spying activities

The target list also includes an EU diplomatic organization for the first time, ESET researchers can reveal. Here’s all you need to know.

Chinese hackers are relying on legitimate VPN services to mask illegal activities, and for the first time, a diplomatic organization in the European Union is among their targets.

These findings come from the latest ESET report on APT (Advanced Persistent Threat) groups’ activities between April and September 2024.

All the best VPN apps encrypt internet connections to prevent third-party access while spoofing users’ real IP addresses for maximum online anonymity. But what if those who use these services are professional government-backed hackers?

SoftEther VPN: hackers’ tool of choice

“One trend that we noticed among several China-aligned threat actors is the use of SoftEther VPN instead of their usual implants or backdoors,” Mathieu Tartare, senior malware researcher at ESET, told Cyberscoop.

SoftEther VPN is an open-source virtual private network (VPN) software that can use HTTPS connections to establish a VPN tunnel. This allows its users to bypass a company’s firewall, for instance, while blending into legitimate traffic.

Experts observed the Webworm APT group, a cyberespionage group linked to China, switching from full-featured backdoors (such as the Trochilus RAT) to the SoftEther VPN Bridge on compromised machines of several governmental organizations in the EU.

“Such a VPN bridge allows the attacker to establish direct communication between the attacker-controlled infrastructure and the victim’s local network, bypassing port filtering and accessing resources that might be blocked on the external router or firewall of the targeted organization,” noted researchers.

#ESETresearch released its latest APT Activity Report covering April to September 2024 (Q2 2024–Q3 2024). This period saw 🇨🇳 China-aligned APT groups increasingly relying on VPN platforms – specifically the open-source SoftEther VPN – to maintain access to victims’ networks. 1/2 pic.twitter.com/HazCFT55UsNovember 7, 2024

Webworm wasn’t the only group regularly deploying SoftEther VPN, either. GALLIUM, Flax Typhoon, and MirrorFace all have been using the VPN service during the research period with the latter making regular use of it since the end of 2023.

For the very first time, the MirrorFace group also expanded its target list outside Japan, including an EU diplomatic organization alongside its usual targets.

Researchers did not name the compromised organization. Yet, the attack still appears to be linked with Japanese affairs as hackers sent the victim a phishing email about the 2025 World EXPO exhibition, which is set to be held in Osaka.

Talking to Cyberscoop, Tartare said organizations should consider any SoftEther VPN executables deployed on the network as suspicious and block them if they aren’t needed. You should be especially wary of those SoftEther VPN executables that do not have the right filename, he added.

For more tips and tools on how to secure your organizations, I recommend checking our dedicated pages of the best business VPNs and endpoint protection software currently on the market.

Read More 

NASA and Microsoft team up to create an Earth Copilot AI chatbot

NASA space data can now be accessed through a Microsoft-based AI chatbot.

New Azure OpenAI Service-based AI chatbot lets users interact with spaceborne dataThe tool democratizes access to more users, including students and academicsUsers can ask natural language questions and let AI source the data

Microsoft and NASA have teamed up to launch Earth Copilot, a new custom copilot built on the Azure OpenAI Service platform to help the space agency make sense of the more than 100 petabytes of data that it has collected from space.

In a blog post, Microsoft explained geospatial data is already complex, and additional data being continuously collected from new satellites is adding to this difficulty.

With the new Earth Copilot tool, users will be able to interact with NASA’s data with natural language prompts, making it more accessible to more scientists, students and others.

Microsoft builds new AI chatbot for NASA

Tyler Bryson, CVP for US Health & Public Sector Industries at Microsoft, explained that data collected can include atmospheric conditions, land cover changes, ocean temperatures and more, but navigating technical interfaces, understanding data formats and getting to grips with geospatial analysis can be extremely challenging.

With the new Earth Copilot tool, users will be able to ask questions like “What was the impact of Hurricane Ian in Sanibel Island?” or “How did the COVID-19 pandemic affect air quality in the US?” and let AI do the data retrieval for them.

“We’ve designed the system to handle complex queries and large datasets efficiently, ensuring that users can quickly find the information they need without getting bogged down by technical complexities,” noted Juan Carlos López, former NASA engineer and current Azure Specialist at Microsoft.

A side effect of the project is that Microsoft and NASA have democratized access to spaceborne data, allowing a broader demographic to interact with it, including students and academics.

Minh Nguyen, Cloud Solution Architect at Microsoft, added: “The vision behind this collaboration was to leverage AI and cloud technologies to bring Earth’s insights to communities that have been underserved, where access to data can lead to tangible improvements.”

You might also like

Check out the best AI tools and best AI writersWe’ve curated a list of the best data visualization toolsEven NASA struggles to keep its user data safe and secure

Read More 

The rising tide of maritime cyberthreats in global trade

As the maritime industry becomes increasingly digitized, it also becomes more vulnerable to damaging cyberattacks.

The shipping industry is a critical component of global trade, with approximately 90% of world trade carried by sea. As the industry becomes increasingly digitized, it also becomes more vulnerable to damaging cyberattacks, with 23,400 malware and 178 ransomware detections registered in the first half of 2024 alone, according to a recent Marlink report.

The early adoption of technology in the maritime industry, like electronic navigation systems, created basic vulnerabilities that allowed unsophisticated cyber-attacks to be introduced. While these incidents were seen as accidental or opportunistic, they highlighted the industry’s lack of strategy and defense against cyber threats.

As the industry has developed and embraced more advanced technologies, so has the surface of attacks. Threat actors are quickly adopting new, AI-enabled techniques to increase the volume and sophistication of their attacks. Our latest threat intelligence shows the cyber threat landscape is a maelstrom of groups exploiting the latest vulnerabilities and utilizing new or updated malware families to target commercial enterprises and critical infrastructure.

Attackers can now gain prolonged access to networks containing sensitive information and use this to disrupt crucial operations, through a single point of entry. In the last year alone, marine giant, Brunswick Corporation has grappled with a cyberattack that disrupted their operations for nine days, causing a material impact of $85 million. Additionally, the European cargo shipping industry was targeted by Chinese threat actors earlier this year, who gained access to not only the office systems but also aboard the cargo vessels using a USB drive.

The reality is that cyberattacks at sea have the potential to be significant and long-lasting. Onboard system failures and compromises can put the safety of the crew and ship at risk. GPS spoofing or jamming can lead to collisions and grounding, while attacks targeting engine controls or ballast waste management systems can lead to crucial failures that increase the risk of environmental disasters like oil spills.

With the global maritime digitization market expected to grow by 14.2% by 2031, the industry will continue to face persistent threats from well-funded criminal organizations and state-sponsored actors. So, how can the maritime industry combat this growing threat?

Measuring the scale of potential disruptions

A key challenge for the maritime industry is operational technology lacking security capabilities like strong authentication found in IT systems. Meanwhile, reliable connectivity can be tough to come by while at sea or in remote parts of the world, and this greatly decreases the efficacy of most cybersecurity tools (but not all). Too many systems are cloud-dependent to work well when offline.

An additional hurdle to security at sea, and in ports, is the long lifespan of the systems in use, which is typically 10-30 years. Attackers only need to flood networks with legitimate-looking commands to gain entry. Hidden under the lack of detection systems, crews may not notice they have been boarded and by then the momentum of the attack has carried the vessel off course. Ensuring the security of interconnected systems and protection against remote hacking attempts are critical concerns.

Dr. Rory Hopcraft of the Cyber-SHIP Lab at the University of Plymouth and Dryad Global, CEO Corey Ranslem recently conducted lifelike simulations to identify the potential impact of today’s maritime security risks. The scenario involved attackers using a phishing email to install malware on a container ship entering the New York harbor.

The malware waited for GPS coordinates of the ship’s location, then flooded command systems to override the bridge and send the engines to full power. Within just 2.5 minutes, the massive vessel drifted off course and ran aground, blocking the critical shipping channel into New York for days. This single-ship incident would have disrupted over $1.6 billion in trade, impacting the entire supply chain.

In this simulation, the crew received an email from their onshore support team asking for a chart update. This points to a key vulnerability within the industry; human error and lack of cybersecurity training. Additionally, other potential attack vectors were identified, from engineers taking on devices themselves to conduct software firmware updates to ship pilots plugging in their own devices. The simulation even tested the scenario of crew members connecting e-cigarettes to the ship’s bridge.

The results showed that in every scenario, malicious software can and will board the ship eventually.

Enhancing cyber resilience at sea

Industry collaboration to strengthen collective defenses is vital. The IMO’s 2021 resolution on maritime cybersecurity, for example, mandates shipowners and operators to incorporate initiatives that allow for collective information sharing.

From an operational perspective, comprehensive strategies must be adopted by shipping companies and port operators to safeguard against sophisticated cyber threats. Implementing advanced technological solutions like intrusion detection systems and encryption protocols can protect critical systems from unauthorized access. Additionally, strong endpoint protection platforms will maintain a level of security even when in disconnected environments and regular software updates will mitigate the risk of software supply chain attacks.

Employing zero-trust strategies, like network and data-centric segmentation, is also essential for continuous access control and security validation. Furthermore, maritime companies must foster a culture of cybersecurity awareness with regular training and drills to equip crews with the skills needed to recognize and respond to potential threats and compromised systems.

Finally, the maritime industry must review its critical event management processes. Emergencies and disruptions will continue to happen; it’s how companies prepare and respond to them that determines their impact. Maritime companies should harness a secure emergency notification system with incident response tools and capabilities. This will provide the necessary tools to deploy response teams and enable them to better prepare for, respond to, and recover from critical events faster.

As the maritime sector continues to digitalize, the importance of robust cybersecurity measures and proactive risk management cannot be overlooked. The industry doesn’t have to face this challenge alone, working with a trusted security partner to harness advanced AI technologies, deploy innovative zero-trust and endpoint management strategies, and enhance critical event management capabilities. Only then will the industry truly be prepared to tackle cyber takeovers at sea.

We’ve featured the best encryption software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Read More 

Time is rapidly running out for Windows 10, as Microsoft shuts down Beta testing channel

Windows 10 death knell sounds, as Microsoft shuts down Beta testing channel – so don’t expect any new features for the OS.

Microsoft has deployed one final preview build to the Beta test channelThe Beta channel is being closed down, leaving only Release Preview nowThis effectively means Windows 10 won’t get any more new features

Microsoft has just dropped the guillotine on the Beta channel for Windows 10, a testing platform that was only recently resurrected earlier this year.

The news was delivered as part of a new Beta preview in the usual blog post from Microsoft detailing the changes with build 19045.

In fact, this build is being released simultaneously to both the Release Preview and Beta channels for Windows 10 22H2, but it marks the end of the road for the latter.

Microsoft explains: “The Beta channel and Release Preview channel will receive the same Windows 10 build today just like we’ve been doing since June. However, this will be the last time we release a Windows 10 build to the Beta channel as we will be shutting down the Beta channel for Windows 10.”

Those Windows 10 testers who are currently in the Beta channel will be moved over to the Release Preview builds.

As for the work done in build 19045, it consists of some bug fixes, with the only actual change feature-wise coming to the Beta channel.

Don’t get excited, though, as Microsoft’s parting gift to Windows 10 is the Start menu now showing adverts (or ‘suggestions’ as the software giant puts it) for apps from the Microsoft Store which are from a “small set of curated developers” apparently.

Boo, hiss, etcetera – though you can turn off the ‘Show suggestions occasionally’ for the Start menu (head to Settings > Personalization > Start).

(Image credit: Shutterstock / Wachiwit)

Analysis: Time is running out for Windows 10

The Beta channel only came back to life in June 2024, as a platform for testing and continuing active development of Windows 10 – albeit in a limited fashion – so it was only briefly resurrected for not even half a year before getting the axe again.

This means that changes such as the above Start menu tweak won’t be coming to Windows 10 any longer (though in the case of this addition from Microsoft, you might be glad to see the back of active development for the older OS).

Effectively, this is Microsoft putting Windows 10 on ice, without saying as much – and that’s no surprise. After all, Windows 10 only has 11 months left on the clock before it runs out of support, so feature additions don’t make much sense at this point. Going forward, all we’ll have is the Release Preview channel for testing, the final stage of Insider builds before the release version of Windows 10, where minor fixes and bug squashing will be carried out.

Don’t expect anything new, in short, though we suppose Microsoft could still surprise us – this has happened in the past, after all, when the software giant announced an effective feature freeze, only to thaw that move with some reasonable-sized feature drops.

At any rate, the shuttering of the Beta channel is another reminder that if you are on Windows 10, you should be starting to consider your End of Life options. Whether that’s upgrading to Windows 11 somehow, or an entirely alternative approach like one of the more Windows deserter-friendly Linux distros, perhaps.

You may also like…

Windows 11’s feature to allow typing with your Xbox controller has vanished in a blow for owners of handheld gaming PCsDon’t make these 5 big mistakes when using Windows 11Windows 11 remains an unloved OS – but why won’t people upgrade?

Read More 

Scroll to top
Generated by Feedzy