radar-rss
How movies and shows end up on your streaming services: studio rights explained
Who decides which streamer gets what, and when?
Movies and shows are licensed rather than sold outright
Pay-TV and video on demand are usually licensed before streaming
Rights are increasingly being licensed to multiple platforms
If like me you enjoy nothing more than watching a great new movie on great home cinema kit, you’ve probably asked this question more than once about an exciting new release: when’s it coming to one of the best streaming services – and which streamer is it coming to? And the answer is: it’s complicated.
In a simpler world every movie would come to every streaming service. But of course we live in a world that’s much messier, which is why we write separate guides to cover the best movies coming to Netflix, to Disney Plus, to Max, to Prime Video, to Paramount Plus and to Apple TV Plus.
So how do certain movies end up on certain streamers, and who decides who gets what and when? Let’s find out.
How movies aren’t sold
(Image credit: Netflix )
It’s important to clarify what it means when we talk about films being released. Films aren’t sold outright; in most cases, the companies that paid for them own them and like to keep it that way. What studios and their distributors do is sell licenses to show, sell or stream movies in a particular way, in a particular place, for a particular period of time.
When your local megaplex shows Wicked, it hasn’t bought the movie; the theater chain has bought a licence to screen it in certain territories for a few weeks or months. Similarly, when Prime Video, Max or Paramount Plus offers a movie as part of your membership, the streamer has bought a licence that gives it the right to stream it – again, in certain territories for a certain period of time.
In addition to being licensed to different companies in different parts of the world, movie licenses are also sold in several stages. A studio movie will typically be shown in theaters first, made available digitally as pay-per-view or buy-to-own, and then made available on streaming.
Things are slightly different with TV shows, because of course there’s not a theatrical release. But unless a show is made in-house by a streamer, it’ll be licensed in much the same way that movies are.
Windows on the world
(Image credit: Sony Pictures / Apple)
The movie business uses the term “release windows” to describe the different stages of a movie release campaign. So you have the theatrical release window, the pay-per-view window, the first streaming release window and so on.
The first release window is the original theatrical release. That used to be very long, typically three to six months or more, and then COVID came along. With theaters shut the studios either massively reduced the theatrical release window or abandoned it completely, turning to pay per view and streaming deals instead. And while COVID closures are thankfully a thing of the past, the much shorter theatrical windows remain.
Theatrical licences are traditionally exclusive: you won’t usually be able to rent or buy a movie anywhere while it’s still having its initial theatrical run. But the time between a movie hitting theaters and being available to rent, buy or stream is much shorter than it used to be.
Everything’s accelerating
(Image credit: Blumhouse/Universal)
According to Indiewire, the average theatrical window across all the big studio movies in 2023 was just 37 days. There were outliers such as Oppenheimer, which spent 122 days as a theater-only release. But that one was really unusual. The same studio’s Super Mario Bros Movie was more typical (and more profitable), ending its theatrical run after 41 days.
Indiewire’s analysis shows that Taylor Swift’s Eras Tour movie ran for 60 days while Disney movies averaged 62 days, A24 movies 48 days, Paramount 42 days and Sony 35 days. The shortest theatrical window? Five Nights At Freddy’s, which didn’t have one: it was available on Peacock from day one.
FNAF was the third-biggest horror movie opening in cinema history but its release isn’t likely to be widely copied. The consensus is that simultaneous releases are more likely to cannibalize box office sales – especially in genres such as horror, which teens like to see together in theaters – and by missing out on the word of mouth that can turn modest successes into big ones.
When the run is done
(Image credit: Warner Bros. Pictures)
Once the theatrical run is done, it’s time for the release window that matters to streamers. That’s called the Pay One Window, and it’s when movies move from theaters to home viewing.
During the Pay One Window, the rights to show a movie are sold to two different markets: the PVOD/TVOD market (paid/transactional video on demand, aka pay-to-rent and buy-to-own) and the SVOD market, which is short for streaming video on demand.
SVOD means streamers such as Max, Prime, Netflix and Hulu; TVOD means rental and purchases on the likes of Apple TV (but not Apple TV+), Google Play, the Microsoft Store, Amazon (but not Included With Prime) and other digital storefronts.
It’s always clearest if we use a real example, so let’s take Barbie. Barbie’s theatrical run started in July 2023 and stayed exclusive to theaters until September 2023, when it became available through TVOD platforms as a pay-to-rent and buy-to-own digital release. It then became available for Max subscribers to stream in December 2023.
When the Pay One Window expires, it’s time to sell more licences. This next release window is known as the Pay Two Window, and it’s when older movies are licensed, often to other streaming services than during the Pay One period. For example, Sony has a Pay One deal in place with Netflix but a Pay Two deal with all the Disney platforms.
Of the two windows, the Pay One Window is the more desirable: pent-up demand for big-name movies drives sales of new streaming subscriptions in a way that older movies don’t. But Pay Two Window licences tend to be cheaper, and that means they enable streamers to expand their catalogs relatively cheaply.
Relationship status: it’s complicated
(Image credit: Warner Bros. Pictures)
Traditionally, Pay One Window deals were for up to 18 months and were exclusive – so if a movie was going to Peacock then it wouldn’t also go to Amazon Prime for at least a year and a bit. But modern movie markets are much messier, and as Variety reports, most studios now licence to multiple streamers either simultaneously or slightly staggered.
As if that wasn’t complicated enough, some of the movie studios also own streamers and some of the streamers make movies. So for example Apple TV+ and Netflix make movies that hit theaters first but which were made with streaming in mind; Disney the company owns Disney the studio and Disney Plus the streamer, so Disney movies will move to Disney Plus after their theatrical run finishes. But Disney also owns 20th Century Fox and Searchlight, and those movies don’t just end up with Disney+ or the Disney-owned Hulu; they are usually licensed to HBO and Max too.
Here’s how Variety describes it. “Netflix gets major studio fare from Sony Pictures and additional prestige films from Sony Pictures Classics, while Prime Video offers rotating selections of Universal and Paramount titles, alongside Amazon’s MGM films after they’re done on MGM+. Disney’s streamers eventually get Sony titles, too, and Hulu is also where art-house distributor Neon’s films stream after their theatrical runs.”
As we said, it’s complicated – and it’ll only get more so.
You might also like
The best streaming services
The best streaming deals to save you money
Enjoy movies and shows on one of the best TVs
A $100bn tech company you’ve probably never heard of is teaming up with the world’s biggest memory manufacturers to produce supercharged HBM
$100bn tech company is teaming up with the world’s biggest memory manufacturers to produce supercharged HBM.
HBM is fundamental to the AI revolution as it allows ultra fast data transfer close to the GPU
Scaling HBM performance is difficult if it sticks to JEDEC protocols
Marvell and others wants to develop a custom HBM architecture to accelerate its development
Marvell Technology has unveiled a custom HBM compute architecture designed to increase the efficiency and performance of XPUs, a key component in the rapidly evolving cloud infrastructure landscape.
The new architecture, developed in collaboration with memory giants Micron, Samsung, and SK Hynix, aims to address limitations in traditional memory integration by offering tailored solutions for next-generation data center needs.
The architecture focuses on improving how XPUs – used in advanced AI and cloud computing systems – handle memory. By optimizing the interfaces between AI compute silicon dies and High Bandwidth Memory stacks, Marvell claims the technology reduces power consumption by up to 70% compared to standard HBM implementations.
Moving away from JEDEC
Additionally, its redesign reportedly decreases silicon real estate requirements by as much as 25%, allowing cloud operators to expand compute capacity or include more memory. This could potentially allow XPUs to support up to 33% more HBM stacks, massively boosting memory density.
“The leading cloud data center operators have scaled with custom infrastructure. Enhancing XPUs by tailoring HBM for specific performance, power, and total cost of ownership is the latest step in a new paradigm in the way AI accelerators are designed and delivered,” Will Chu, Senior Vice President and General Manager of the Custom, Compute and Storage Group at Marvell said.
“We’re very grateful to work with leading memory designers to accelerate this revolution and, help cloud data center operators continue to scale their XPUs and infrastructure for the AI era.”
HBM plays a central role in XPUs, which use advanced packaging technology to integrate memory and processing power. Traditional architectures, however, limit scalability and energy efficiency.
Marvell’s new approach modifies the HBM stack itself and its integration, aiming to deliver better performance for less power and lower costs – key considerations for hyperscalers who are continually seeking to manage rising energy demands in data centers.
ServeTheHome’s Patrick Kennedy, who reported the news live from Marvell Analyst Day 2024, noted the cHBM (custom HBM) is not a JEDEC solution and so will not be standard off the shelf HBM.
“Moving memory away from JEDEC standards and into customization for hyperscalers is a monumental move in the industry,” he writes. “This shows Marvell has some big hyperscale XPU wins since this type of customization in the memory space does not happen for small orders.”
The collaboration with leading memory makers reflects a broader trend in the industry toward highly customized hardware.
“Increased memory capacity and bandwidth will help cloud operators efficiently scale their infrastructure for the AI era,” said Raj Narasimhan, senior vice president and general manager of Micron’s Compute and Networking Business Unit.
“Strategic collaborations focused on power efficiency, such as the one we have with Marvell, will build on Micron’s industry-leading HBM power specs, and provide hyperscalers with a robust platform to deliver the capabilities and optimal performance required to scale AI.”
More from TechRadar Pro
SK Hynix teams up with TSMC to advance HBM development
Samsung rival unveils “world’s largest capacity” 16-Layer HBM3e chips
Samsung confirms next generation HBM4 memory is in fact Snowbolt
US Government officials urged to lock down devices amid telecoms breach
High-ranking US officials have been urged by CISA to enable advanced security features.
CISA has released an advisory for US government communications
Government officials are encouraged to lock down their devices
This follows the discovery foreign actors have breached US telecoms networks
CISA has urged ‘highly targeted’ individuals in the US Government or in senior political positions to immediately review and implement strict security measures with their mobile devices.
This comes after multiple major US telecoms firms were hit by security breaches earlier in 2024, most likely originating from state-sponsored Chinese hackers.
Recent reports also confirmed that the group behind the attack, Salt Typhoon, had not yet been fully eradicated, and still lurks inside US telecoms networks.
Lockdown mode
As part of its advisory, CISA also released a best practice guide for mobile communications, which includes instructions on using end-to-end encryption, password managers, Fast Identity Online (a phishing resistance authentication), and advice on how to migrate away from SMS based multi factor authentication.
CISA recommends iPhone users turn on ‘Lockdown mode’, which strictly limits certain apps and makes many features unavailable in order to reduce the attack surface that attackers could potentially exploit.
The scale of this attack makes it a serious concern for any high-ranking officials, with major networks like Verizon, AT&T, and Lumen Technologies found to have threat actors with access inside their systems.
“Highly targeted individuals should assume that all communications between mobile devices — including government and personal devices — and internet services are at risk of interception or manipulation,” CISA said.
Communications remain an attractive target for foreign actors, as breaches can result in significant disruptions and sensitive data loss.
US communications in particular have come under attack this year, especially against government and political targets in the run up to the US election last month. A ‘hack and leak’ campaign hit president-elect Donald Trump on the campaign trail in an attempt to compromise the campaign, which resulted in two indictments for the suspected individuals.
Via The Record
You might also like
Take a look at our pick of the best firewalls around
Volt Typhoon is actually a CIA asset, China claims
Check out our choices for best malware removal software
Sophos flags concerning firewall security flaws, users told to patch now
Sophos patched three flaws it found in its firewall, including two critical issues.
Sophos says it found, and patched, three flaws in its firewall product
The flaws allowed for RCE and privilege escalation
Those unable to apply the patch can use a workaround
Sophos has recently discovered, and patched, three bugs in its Firewall product, and given the severity, has urged users to apply the fixes as soon as possible. Those that cannot do that are advised to at least apply the suggested mitigation workarounds.
A security advisory from the company notes the three vulnerabilities can be abused for remote code execution, privileged system access, and more. Two of the flaws were given a critical severity score (9.8), with the third one being high-severity (8.8).
Multiple versions of the Sophos Firewall were said to be affected, although different versions seem to be susceptible to different flaws. Still, the company urges all users to bring their endpoints to the latest version and avoid getting targeted.
Workaround possible
Patching also differs, depending on the vulnerability in question. For CVE-2024-12727 users should launch Device Management, navigate to Advanced Shell from the Sophos Firewall console, and run the command “cat /conf/nest_hotfix_status”.
For the remaining two flaws, users should launch Device Console from the Sophos Firewall console, and run the command “system diagnostic show version-info”.
Users that cannot apply the patch should at least apply the suggested workaround, which includes restricting SSH access to only the dedicated HA link that is physically separate. Furthermore, users should reconfigure HA using a sufficiently long and random custom passphrase.
Finally, they can disable WAN access via SSH, and make sure that the User Portal and Webadmin are not exposed to WAN.
Further details about the bugs, including the CVEs, can be found on this link.
Firewalls are major targets in cyberattacks because they act as the primary gatekeepers between internal networks and external threats, making them critical points of defense for sensitive data and systems.
Compromising a firewall can grant attackers privileged access to a network, bypassing security controls and exposing the entire system to further exploitation. Additionally, firewalls often hold valuable configuration data and access credentials, which attackers can leverage to escalate their attacks or maintain persistent access.
Via The Hacker News
You might also like
Sophos Firewall found a serious security issue
Here’s a list of the best antivirus tools on offer
These are the best endpoint protection tools right now
AMD RDNA 4 GPU rumors flood forth, including possible name change to RX 9070 – because bigger is better, compared to Nvidia’s RTX 5070?
Fresh speculation on the performance of the claimed RX 9070 XT might disappoint PC gamers, though.
AMD is supposedly launching RX 9070 XT and RX 9070 next-gen GPUs
Previous rumors suggested these would be the RX 8000 series
Performance is rumored to be a bit slower than previous chatter from the grapevine
Rumors around AMD’s next-gen GPUs have gone into overdrive this past weekend, and we’ve learned that these RDNA 4 graphics cards may not be the RX 8000 series as previously thought – and we’ve been treated to further speculation on price and performance, too.
So, the theory now is that AMD is going to launch an RX 9070 XT, as first flagged up by an editor on Chiphell, which was pointed out by HXL on X. This will supposedly be the top RDNA 4 GPU, previously rumored to be the RX 8800 XT.
It’ll come alongside a vanilla RX 9070 as a lower-tier offering, if another presence on X – All The Watts, a name we’re not familiar with in the rumor scene – is correct. They believe that the RX 9070 XT will be slightly slower than the current 7900 XT, and that the plain RX 9070 will be about equivalent to the performance of the 7800 XT.
All The Watts spilled some purported price ranges, too, and it seems AMD is looking at around $449 to $649 (in the US) for the Navi 48 graphics cards, which will put the RX 9070 XT at that $650 or so level, and the plain RX 9070 perhaps at $550 to $600. It all feels very vague, though – we’re also told that dropping down a chip, Navi 44 GPUs will range in price from $179 to $349 (RX 9060 models and downwards, presumably).
Another regular rumor peddler on X, Hoang Anh Phu, also shared that the RX 9070 XT is coming at CES 2025, where AMD is rumored to be revealing RDNA 4 – and that FSR 4 will debut alongside it (plus a whole bunch of other stuff, too, in theory).
RX 9️⃣0️⃣7️⃣0️⃣ XT🚀 = FSR 4🚀 = R9 X3D🚀December 23, 2024
Finally, Hoang Anh Phu also claimed that a render of a GPU that cropped up in an official AMD advert is supposedly a reference design for one of the next-gen graphics cards from AMD. Season that, and all of this chatter, liberally, of course.
It’s worth further noting that All The Watts reckons there’ll be mobile 9070 variants too, which would be no surprise, but that we may also get some new GPUs for the current RDNA 3 range, namely the RX 7750 and 7650. The latter in particular might be an interesting addition for more affordable GPUs (hopefully).
(VideoCardz spotted all these various posts, by the way, so a hefty four hat tips goes their way – 1, 2, 3, 4).
(Image credit: MSI)
Analysis: Turning it up to 9070?
There’s been a lot of spillage in a very short time around AMD’s next-gen GPUs, and it seems that the RX 9070 XT and 9070 might really be happening. The story is that this was a late switch from AMD in terms of next-gen naming, as until recently, Team Red was going to run with RX 8000 as had been claimed via the rumor mill.
Why switch the name? Well, in some ways, the change to RX 9070 performs that trick of making it seem ‘better’ than Nvidia’s xx70 class graphics card, which this time round will be the RTX 5070 (and 5070 Ti, apparently). So, your mid-range choices early next year could be the RTX 5070 (Ti) or RX 9070 (XT), so the bigger number must be better, right?
It’s that kind of Spinal Tap (turning it up to 11) marketing thinking, we assume (if it happens) – and it’s interesting to note that rather than the 9700 XT, it’s the 9070 XT. (Although that’ll help avoid confusion with AMD’s Ryzen CPU names, to be fair, and the Ryzen 9700X – but it does seem angling very much towards ‘outplaying’ Nvidia too).
The other reason could be that – again, according to rumors – AMD is looking to switch away from the RDNA brand entirely after this next generation of graphics cards. We won’t have RDNA 5, in other words, but UDNA, the ‘U’ meaning unified as this architecture will supposedly bring together CDNA (data center) and RDNA (gaming) under one umbrella.
If that happens, then AMD’s likely to head off the RX x000 naming path entirely, which would make sense rather than go with RX 10000 – which doesn’t work after RX 9000, of course. In other words, the move to UDNA effectively frees up the RX 9000 name for this generation – so why not use it now? We’re just engaging in pure speculation here, mind, but this makes us think it’s perhaps a bit more likely that UDNA, not RDNA 5, comes next on AMD’s GPU roadmap.
As for the performance levels mentioned above for the RX 9070 XT and 9070, they’ll probably come as a bit of a disappointment. The previous hope was that the RDNA 4 top dog GPU could be a bit faster than the 7900 XT, and it’s seemingly slightly slower according to All The Watts – but be particularly skeptical there.
Furthermore, we assume that this is talking about rasterization (non-ray tracing performance), and for ray-traced graphics, AMD supposedly has a much bigger leap in frame rates ready for us, or so other rumors have suggested.
You might also like
The best graphics card deals out there
Top gaming PCs: great rigs for serious PC gaming
Best PC games of 2024: must-play titles you don’t want to miss
A new Microsoft 365 phishing service has emerged, so be on your guard
FlowerStorm has significant overlaps with the defunct Rockstar2FA, warns Sophos.
Researchers said that Rockstar2FA went quiet in November 2024
But a new PaaS emerged soon afterwards, with partly overlapping infrastructure
The new PaaS is called FlowerStorm, and it targets Microsoft365 accounts
Cybersecurity researchers from Sophos have warned a new Phishing-as-a-Service (PaaS) tool has emerged, allowing threat actors to easily hunt for people’s Microsoft 365 credentials.
This tool is called FlowerStorm, and it might have emerged from the (defunct) Rockstar2FA, the company revealed, noting how in November, detections for Rockstar2FA have “suddenly gone quiet”.
The organization’s infrastructure was taken offline, at least partly, for reasons yet unknown – but the researchers don’t think this was the work of law enforcement, though.
Long live FlowerStorm?
Rockstar2FA was a PaaS platform designed to bypass two-factor authentication (2FA), primarily targeting Microsoft 365 accounts. It worked by intercepting login processes to steal session cookies, allowing attackers to access accounts without needing credentials or verification codes. Through a simple interface and Telegram integration, threat actors that purchased a license could manage their campaigns in real time.
The new platform, which emerged in the weeks after Rockstar2FA went quiet, was dubbed FlowerStorm by the researchers. Apparently, much of its tools and features overlap with that of Rockstar2FA, which is why Sophos speculates that it could be its (spiritual) successor.
The vast majority of the targets chosen by FlowerStorm users (84%) are located in the United States, Canada, United Kingdom, Australia, and Italy, Sophos added.
Companies in the States were most frequently targeted (60%), followed by Canada (8.96%). Overall, almost all (94%) of FlowerStorm targets were either in North America or Europe, with the rest falling on Singapore, India, Israel, New Zealand, and the United Arab Emirates.
The majority of the victims are in the service industry, namely firms providing engineering, construction, real estate, and legal services and consulting.
Defending against FlowerStorm is the same as against any other phishing attack – using common sense and being careful with incoming emails.
You might also like
This worrying new phishing attack is going after Microsoft 365 accounts
Here’s a list of the best antivirus tools on offer
These are the best endpoint protection tools right now
US healthcare giant Ascension says ransomware attack affected nearly six million customers
More than five million people had sensitive data exposed, including healthcare and payment info.
Ascension was struck by ransomware attack in May 2024
It has now concluded its investigation into the attack
Sensitive data on almost 5.6 million people was stolen
Hackers that struck Ascension with ransomware managed to steal a whole treasure trove of sensitive customer information, with medical information, personally identifiable information, payment data, and more all compromised.
The US healthcare giant has now released new details about the ransomware attack, and filed a new form with the Office of the Maine Attorney General.
The cyberattack occurred on May 7 and 8, leading to significant disruptions in clinical operations. Employees were unable to access electronic health records and patient portals, and some facilities were even forced to divert ambulances, and elective care was paused in the aftermath.
Disrupting healthcare
In the filing, the firm said exactly 5,599,699 people were affected by the incident, and in the update, it added that the information crooks took included:
medical information (medical record number, date of service, types of lab tests, or procedure codes)
payment information (credit card information or bank account number)
insurance information (Medicaid/Medicare ID, policy number, or insurance claim)
government identification (Social Security number, tax identification number, driver’s license number, or passport number)
and other personal information (date of birth or address).
While the attack seems enormous, putting millions at risk of identity theft, wire fraud, phishing and social engineering attacks, Ascension is keeping a positive outlook.
“Although patient data was involved, importantly, there remains no evidence that data was taken from our Electronic Health Records (EHR) and other clinical systems, where our full patient records are securely stored,” it said.
The company said it will now start notifying affected individuals, and expects the job to be done within three weeks.
At press time, no threat actors took responsibility for the attack, and we don’t know if Ascension paid any ransom in exchange for the data – although it did say the attack hurt its ability to recover from the previous financial year.
You might also like
Ascension healthcare giant forced to take systems offline following cyberattack
Here’s a list of the best antivirus tools on offer
These are the best endpoint protection tools right now
This tiny wireless speaker promises to sound like a big beefy stereo system using psychoacoustic tricks
Trick your ears into hearing more speakers
Two 15W drivers in a very small cube-style case
Digital signal processing adjusts speaker output to emulate distance
Available from Japan for roughly $255
One of the key things about stereo sound is that to get it, you need decently spaced stereo speakers. And that’s a problem for small devices where you can’t space the speakers out enough to get a large stereo sound stage. Manufacturers have come up with lots of tricks to make small speakers sound bigger, but to the best of my knowledge Pavé’s little speaker is unique: it’s got a gyroscope inside.
The Cear Pavé is an exceptionally small speaker, just over three and a half inches in each dimension, that promises to sound much bigger, with a stereo image close to what you’d hear from a traditional twin-speaker setup. And to do that, it uses clever technology to mess with your brain.
Pychoacoustics, qu’est-ce que c’est?
According to Notebookcheck.net, The speaker uses a combination of digital signal processing and what’s known as psychoacoustics, which is the study of how we perceive sound.
We don’t just hear sound directly. We hear its reflections and its vibrations too, and with a bit of technological trickery, you can adjust the output of speakers to emulate that – so for example by slightly adjusting the timing of certain frequencies to your speaker drivers you can replicate the short delay that would come from having a speaker placed a little further away from you.
In this speaker the processing is carried out by a Qualcomm S5 Gen 2 chip and then delivered via twin 15-watt drivers to deliver a much larger-sounding stereo sound than you’d expect from such a small speaker.
The Pavé isn’t the only speaker to do this, of course: Sony’s Reality Audio, and similar systems from other firms, also use digital signal processing to make their speakers sound bigger. But it also contains the aforementioned gyroscope to detect the movement and positioning of the speaker and to adjust its stereo effect accordingly.
Here’s how it works, according to Cear’s patent: Its “sound processing device includes an equalizer that tunes the frequency characteristic so that a frequency characteristic of the sound wave listened in a second environment replicates the frequency characteristic of a sound wave listened in a first environment.” So there you have it. Qualcomm has a good explainer on its developer blog too.
I haven’t heard this particular speaker but I’d like to: we’ve come a long way from the frankly crap “virtual stereo” and “virtual surround” of early Bluetooth speakers and soundbars; when it’s done well, digital signal processing can produce quite startling results.
You might also like
The best Bluetooth speakers you can buy today
The best wireless speakers for 2024 and beyond
The best AirPlay speakers
Say hello to SetMe: A modern solution for offering remote tech support
SetMe is a remote support solution for businesses of all sizes that allows IT teams to easily secure a connection to remote computers, allowing for ad-hoc or unattended support that was designed with years of experience in remote support software from the team behind FixMe.IT.
Remote work has dramatically changed how we conduct business in recent years, opening our businesses up to a scale where the best employees could be a hemisphere away. But with remote work comes a need for technical support that can span the globe. How do we address a need to provide technical support to remote workers without compromising the integrity of their computer systems? SetMe fulfills this need with an easy-to-setup, easier-to-use expert control panel that connects support teams with remote clients.
Developed by the knowledgeable teams behind FixMe.IT, SetMe is built upon more than 17 years of experience in the remote desktop and support field. Despite the rise in remote work scenarios, the remote desktop software market has stagnated with outdated technology that can be risky for your team to use. The team behind SetMe’s experience sets this software apart because they built it with modern technology that can keep your client’s system secure while still delivering faster, better, more reliable performance compared to the tech support software of yesteryear.
(Image credit: Techinline)
Connecting with SetMe to a remote computer is a simple three-step process. Start by requesting the remote client to download and install the SetMe Client app, from which they will be assigned a randomly generated Client ID. From the expert console, click New Connection and enter the remote user’s Client ID to allow SetMe to connect. From there, tech support teams can then remotely control the desktop. It doesn’t matter if your team is running on a fleet of Macs, Windows PCs, or a combination of the two – SetMe works flawlessly with both systems to allow your tech teams to control as if they were the ones sitting at the keyboard.
A connection via SetMe is safe, reliable, and secure with end-to-end encryption technology that allows your team to access data between remote devices, even if those devices are unattended by another user. Remote work can often mean your team is scattered across multiple time zones, but you don’t need to worry about scheduling conflicts and availability with SetMe. Systems can even stay connected via SetMe through reboots, shut-downs, and when the remote computer is in sleep mode.
(Image credit: Techinline)
Security and productivity are important with remote work, and SetMe can make it easy to track your team’s connectivity and login history. This allows you to make more accurate, data-driven decisions for your business without compromising the privacy or workflow of remote team members. Systems with SetMe can be locked down for strict private access rules with consent filters, or more freely available with single-click connections of unattended machines. The SetMe Expert Console is flexible and reliable for a variety of remote tech support scenarios.
All of this connectivity and support is powered by a robust toolset designed to meet the needs of today’s remote workforce. Users can effectively multitask in different windows across multiple connected computers, synchronize clipboard data for easier sharing, transfer files, and run software or other applications as the admin on the client computer. You can even manage multiple machines from one system at one time, making it easy to push updates to clients for hardware or transfer sensitive files simultaneously across your team.
SetMe’s robust tools for supporting remote clients can fulfill a multitude of needs for businesses, but that doesn’t mean the team behind the software is done with innovation. New features are always in the works to further improve the way your team can function, no matter where in the world they may be. SetMe takes feedback from its users to heart, allowing the team to further develop functionality and tools that can make remote tech support better for all of us who rely on the technology.
Sign up now for a 15-day free trial to see if SetMe works for you. If you like having easy, reliable, and secure access to remote systems then you can take advantage of one of SetMe’s two pricing plans: Solo pricing starts at just $33 per month and is ideal for the needs of single techies or small businesses. Professional starts at $41 per seat per month, and provides all the remote tools at your fingertips with the freedom to manage an unlimited number of unattended computers. No matter how big or small your remote tech support needs are, SetMe has the features and reliability you need for your team.
Apple’s rumored Ring video doorbell rival could have a clever Face ID trick
The Apple HomePod could soon be joined by a smart home lock and doorbell with Face ID.
Apple could launch smart home security tech
Its smart doorbell could boast Face ID, and use iCloud for video storage
Don’t expect it until late 2025 or 2026
We’ve recently heard rumors that Apple wants to launch a smart home hub with a screen – what’s been described as an Apple HomePod with a display – but the company’s smart home visions reportedly don’t stop there. We could also see it release gadgets like an Apple video doorbell, smart lock, and security camera; so while the Apple Car concept might be dead (another rumored excursion into a previously unexplored product territory), the Apple Home might be about to take off.
This comes via Bloomberg’s Mark Gurman (behind a paywall) in the latest edition of his Power On newsletter, who says Apple is focusing its efforts on robotics, AI, and smart home tech – with smart home being the one most likely to bear fruit somewhat soon in the form of security devices like video doorbells that can deadbolt your front door or in-home security cameras.
The doorbell may be particularly interesting as it would supposedly offer a form of Face ID for your home by automatically detecting if it’s you.
While this smart home pivot may seem a little odd considering how the HomePod has been treated. It seems forever in the background of presentations and announcements, never getting its own chance in the spotlight. Gurman notes, however, that Apple’s smart home shift comes from the company’s belief it has one edge over the competition: trust in its privacy.
Many people don’t want Amazon-made cameras in their homes, or cameras from most major tech companies for that matter, due to concerns over how their private data might be used even if there’s no evidence it’s being mishandled. But Apple has spent years cultivating a persona of being the best there is when it comes to privacy (it’s even a major component of its Apple Intelligence marketing, and wasn’t for other AI until Apple hit the scene), and so Gurman reports the company believes this perception will help it find success with home security tech.
He adds that it could also help Apple juice its iCloud subscription numbers as people would want to store their recordings in the cloud.
Learning from mistakes, or repeating them?
(Image credit: Cesci Angell / Future)
If you head to the Apple Store website you’ll see Apple already boasts a respectable smart home accessory lineup complete with smart locks, smart lights, motion detectors, smart doorbells, and more – but none are made by Apple.
Instead, it relies on third-party accessories which have varying quality according to some reviewers – with this $330 Level smart lock from a few years ago being labeled ineffective as it could be lockpicked with the simplest method known to pickers – but hopefully, Apple has learned from the better options amongst its third-part stock.
As with all leaks, we should take these latest ones with a pinch of salt, and even if Apple’s smart home tech is indeed on the way it could be some time before we see it in action. Mark Gurman says he’s been told not to expect to see anything until at least the end of 2025.
There’s also a non-zero chance Apple may abandon home security before it sees the light of day. One reason for it not continuing with the Apple Car was reportedly execs fearing the company would be associated with car accidents. The same fears – but this time for home security flaws – could be enough to put Apple off expanding into this area in the end.
We’ll have to wait and see what 2025 holds for us, but with reports Apple is developing a ring, and developing AR glasses in the background too, it might not be long before we see Apple’s next big hardware launch.
You might also like
iOS 18.2 fixes an annoying Photos app quirk
Apple’s rumored iPhone subscription service reportedly scrapped
Your M4 iPad Pro can finally get iPadOS 18