Anticipated Merger Between MyState and Auswide Bank Aims to Cut IT Costs by $7 Million


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Banks from Tasmania and Queensland Poised to Join Forces, Projecting $7 Million in IT Savings

Proposed merger between MyState Bank and Auswide Bank to achieve $7 million in IT savings

Key Points

  • MyState Bank and Auswide Bank are set to merge, integrating their core banking frameworks.
  • The merger is expected to result in technology cost savings of up to $7 million.
  • A total pre-tax savings of $20-$25 million is anticipated, with a considerable share stemming from IT.
  • Up to $29 million in one-time synergy costs related to the merger will be incurred, including platform transitions and job redundancies.
  • The core banking integration is predicted to finalize within 18 to 24 months after the merger.
  • Both institutions have been implementing digital upgrades, prioritizing customer experience improvements and security enhancements.

Insights on the MyState and Auswide Bank Merger

MyState Bank, based in Tasmania, and Auswide Bank, headquartered in Bundaberg, have unveiled their intention to merge, collectively serving approximately 272,000 customers across Australia. This alliance, backed by a binding scheme implementation agreement, aims to optimize their operations, especially in technology, where they forecast up to $7 million in IT cost reductions.

IT Cost Reduction Insights

The merger is projected to achieve total pre-tax savings between $20 to $25 million, with a notable portion credited to IT cost efficiencies. Brett Morgan, CEO of MyState Bank, noted that integrating the banks’ core banking systems is “well-advanced” and should be finalized within the initial 18 to 24 months after the merger.

In 2021, MyState Bank moved to the cloud-based Temenos platform to support its core banking operations, positioning itself as a leader in digital evolution. Recent investments in a state-of-the-art internet and mobile banking platform have prepared the bank for this merger.

Upfront Costs and Synergy Opportunities

Although the merger offers considerable cost-saving potential, it comes with one-time synergy expenses expected to total $29 million. These expenses include the migration of technology platforms, workforce redundancies, and other costs related to operational integration. Nonetheless, the long-term financial forecast remains favorable because of anticipated operational efficiencies.

Investment in Technological Advancement

MyState Bank and Auswide Bank have both made substantial investments in technology. In FY24, MyState Bank allocated $21.4 million to tech initiatives, representing 20% of its total operational expenses, which is a 12% increase from the previous year. This commitment underscores the bank’s dedication to enhancing customer experience, risk management, and regulatory compliance.

In a similar vein, Auswide Bank has concentrated on strengthening its IT infrastructure, focusing on cybersecurity and fraud prevention. Its investments span technology, data management, and cybersecurity enhancements, as well as improvements in IT and risk management to promote growth.

Ongoing Digital Transitions

In recent years, both banks have undergone significant digital transformations. MyState Bank’s initiative, projected to conclude this financial year, has introduced a new digital banking app, adopted the New Payments Platform (NPP), and utilized Osko for real-time payments. These developments have modernized their service offerings and boosted customer satisfaction.

Meanwhile, Auswide Bank has embarked on a digital enhancement initiative. This strategy highlights four areas: improving service offerings to brokers and customers, increasing engagement through its branch network, automating processes, and refining digital experiences to appeal to a younger clientele.

Recap

The imminent merger between MyState Bank and Auswide Bank aims to form a more robust and efficient financial institution with substantial IT and other cost savings. While one-off costs associated with platform migration and workforce reductions are expected, the anticipated long-term advantages, especially regarding operational efficiency and customer satisfaction, are projected to surpass these initial expenditures. Both banks have actively pursued technological investments and digital transformation, establishing a strong groundwork for the future growth of the merged entity.

Q: What key advantages does the MyState and Auswide Bank merger provide?


A:

The merger is projected to yield considerable cost reductions, especially in IT, with savings of up to $7 million anticipated. Furthermore, it will foster a more scalable and efficient banking system, enhancing customer engagement and operational efficiency.

Q: What one-time costs are expected with this merger?


A:

The merger may incur up to $29 million in one-time synergy costs, which will encompass migration of technology platforms, redundancies, and other integration-related expenditures.

Q: What is the expected duration for the core banking consolidation?


A:

The consolidation of core banking systems is anticipated to be completed within 18 to 24 months after the merger.

Q: How have MyState and Auswide Bank been gearing up for the merger?


A:

Both banks have undertaken extensive digital transformations to modernize their systems, enhance customer experience, and bolster security measures, adequately positioning them for the forthcoming merger.

Q: What effects will the merger have on clients?


A:

Clients can look forward to improved digital services, enhanced security, and a more cohesive banking experience as the newly merged entity capitalizes on the strengths from both banks.

Q: What is the future outlook for the merged organization?


A:

The future outlook appears positive, with the merged entity expected to gain from operational efficiencies, reduced costs, and a scalable technology framework that supports forthcoming growth initiatives.

EBOS Welcomes Strategic Technology Acquisitions to Enhance Healthcare Innovation


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

EBOS Group: Tech Acquisitions Fueling Advancement in Healthcare

Quick Overview

  • EBOS Group is on a growth trajectory, acquiring 4-6 companies each year, necessitating continuous integration and IT infrastructure updates.
  • The firm’s structured strategy for merging legacy systems mitigates risks and lowers maintenance expenses.
  • EBOS employs a ‘cloud-right’ approach, striking a balance between cloud and on-premise solutions tailored to specific applications.
  • Third-party maintenance providers are frequently engaged by EBOS for legacy systems, ensuring nationwide service and quick response capabilities.
  • Challenges arise in maintaining essential applications on outdated hardware, demonstrating the importance of dependable third-party maintenance assistance.
EBOS employs technology for healthcare advancements

Image credit: EBOS Group

EBOS Group’s Technology-Led Growth Strategy

As a prominent marketer, wholesaler, and distributor in healthcare, medical, and pharmaceutical products, EBOS Group is carefully expanding its reach. With approximately 5000 employees across 108 global locations, the company acquires between four to six new businesses each year. According to Con Pazios, Head of IT Operations, this acquisition strategy mandates EBOS to maintain an ongoing process of integration and IT system reconstruction.

Structured Legacy Environment Integration

In alignment with its strategic initiatives, EBOS has established a structured program for integrating the legacy systems of newly acquired businesses. This program plays an essential role in mitigating risks and diminishing maintenance costs. Upon an acquisition, EBOS assumes legal accountability for the IT environment of the new entity, which prompts the swift development of integration plans.

“Managing technical inheritance and technical debt presents substantial challenges for us,” Pazios noted. The process begins with securing the newly acquired environment, followed by a thorough evaluation of existing physical hardware, virtual servers, and domains. Subsequently, new servers are established, and data is transferred, allowing for the potential decommissioning of the obsolete infrastructure, contingent on environmental complexity.

The ‘Cloud-Right’ Methodology

While migrating to the cloud is typically viewed as a standard approach, EBOS employs a more nuanced perspective. The organization follows what it calls a ‘cloud-right’ strategy, which signifies that not every workload is redirected to the cloud. For instance, certain EBOS warehouses necessitate operational technology (OT) infrastructure that demands extremely low latency, thereby warranting on-premise server solutions.

“If it makes sense to migrate to the cloud, we will certainly proceed, and if modernization is feasible from that point, that’s advantageous,” Pazios elaborated. This methodology enables EBOS to harmonize the advantages of cloud solutions with the distinct requirements of its operations.

IT Modernisation Challenges

Despite the company’s concerted efforts to expedite IT modernization, the timeline can often extend. During these transitional phases, EBOS might need to utilize older, less reliable equipment. In such instances, external Managed Service Providers (MSPs) may be called upon, especially when confronted with intricate or unfamiliar network infrastructures.

“We might acquire a business with a network setup outside our internal capabilities, so we depend on outside MSPs for support,” Pazios remarked. This dependence spans not only to hardware but also to the overall management of the platform.

Significance of Third-Party Maintenance Services

Given the diverse technologies EBOS encounters through acquisitions, there have been cases where aging equipment posed notable risks. A relevant example is a 12-year-old IBM chassis located in Adelaide, responsible for running a critical business application. This device was functioning in a partially vulnerable state with inadequate maintenance support.

When a motherboard component failed, a third-party maintenance provider was able to quickly deliver replacement parts, restoring functionality to the device. This incident emphasized the critical nature of national coverage and the availability of parts when choosing third-party maintenance services.

“For us, the reinstatement of services is crucial, which hinges on response times, part availability, and the capacity to deploy assistance anywhere in the country,” Pazios stressed. He acknowledged that the role of third-party maintenance is likely to remain integral in the EBOS environment.

Conclusion

EBOS Group’s strategy centered on technology acquisitions serves as a pivotal element of its growth in the healthcare industry. Through a structured integration of legacy IT environments, the organization effectively lessens risks and maintenance expenditures. The ‘cloud-right’ approach of EBOS ensures that workloads are appropriately aligned for either cloud or on-premise implementations, informed by specific operational requirements. In spite of the modernization challenges, EBOS strategically utilizes third-party maintenance services to guarantee the dependability and permanence of essential systems.

Q: How does EBOS manage the integration of newly acquired companies?

A:

EBOS employs a systematic integration program for legacy systems, commencing with securing the acquired environment, evaluating existing hardware, and subsequently transferring data to contemporary servers. This strategy minimizes risks and reduces maintenance expenditures.

Q: What delineates EBOS’s ‘cloud-right’ strategy?

A:

The ‘cloud-right’ strategy represents a balanced approach where EBOS assesses whether workloads should transition to the cloud or stay on-premise based on specific operational necessities. Not all workloads are guaranteed to be migrated to the cloud.

Q: What prompts EBOS to engage third-party maintenance providers?

A:

EBOS engages third-party maintenance providers for older systems, particularly when internal expertise is insufficient or when confronting outdated hardware. These providers deliver quick response times and national coverage, which are vital for maintaining critical business applications.

Q: What obstacles does EBOS confront during IT modernization?

A:

Modernizing IT environments is a lengthy endeavor. Throughout this process, EBOS frequently needs to sustain older, outdated equipment, which poses risks. The organization occasionally necessitates external assistance to adeptly manage these environments.

“Preserving Vintage Technology: The Struggles of Sustaining Outdated Hardware”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Challenges of Maintaining Legacy Hardware

Fast Overview

  • Legacy hardware remains a vital element in numerous organisations, especially in sectors such as healthcare and logistics.
  • The upkeep and protection of legacy systems pose distinct challenges, including issues of compatibility, absence of vendor support, and security risks.
  • Organisations need to evaluate the expenses associated with legacy systems against the possible ROI of transitioning to modern technologies.
  • With older systems becoming more prone to cyber threats, cybersecurity has become an increasing worry.
  • Shifting to the cloud is frequently considered a feasible way forward, though it necessitates strategic planning and adequate resources.

The Significance of Legacy Hardware

Despite rapid technological advancements, legacy hardware continues to be crucial in various fields. For businesses such as EBOS Group Limited, Communicat, and Blackwoods, these older systems remain imperative for daily functions. In areas like healthcare, logistics, and finance, legacy systems often manage essential operations that contemporary solutions may not yet completely substitute. Nevertheless, dependence on such outdated technology presents a unique set of difficulties.

Challenges of Upholding Legacy Systems

Maintaining legacy hardware is far from easy. One of the primary concerns is compatibility. As technology progresses, new software and hardware frequently do not mesh well with older systems. This can cause a range of problems, from mere operational inefficiencies to complete system breakdowns.

A further significant issue is the lack of vendor support. As manufacturers discontinue older products, obtaining necessary parts or receiving technical assistance to keep these systems operational becomes progressively challenging. This shortage of resources can elevate maintenance expenses and complicate ensuring that the systems function properly.

Security Issues

Another pressing issue is security. Older systems are more susceptible to cyber threats, often lacking the comprehensive security measures that modern technology offers. Furthermore, legacy systems might not benefit from regular patches, leaving them vulnerable to emerging threats. Given Australia’s growing emphasis on cybersecurity, preserving the security of legacy systems necessitates additional defenses, such as firewalls, intrusion detection systems, and vigilant monitoring.

Considering Costs vs. ROI

Maintaining legacy hardware can incur high expenses, prompting organisations to carefully assess the return on investment (ROI) when deciding on the continuation of older systems. Although the upfront costs of transitioning to new technologies can be overwhelming, the long-term advantages of enhanced efficiency, superior security, and improved support frequently justify these costs.

However, for certain organisations, the expense of downtime or interruptions linked to migrating to new systems might be too significant. In such instances, maintaining legacy hardware with a strong support framework may be the most feasible route, at least temporarily.

Cloud Migration: An Avenue Ahead

A possible resolution to the predicaments of legacy hardware is cloud migration. Transferring legacy systems to the cloud can assist organisations in modernising their operations while preserving the capabilities of their older systems. Cloud platforms provide scalability, flexibility, and strengthened security features that can alleviate numerous issues tied to legacy hardware.

Nevertheless, cloud migration comes with its own set of challenges. It demands meticulous planning, substantial resources, and a clear comprehension of the organisation’s requirements. Moreover, the transition process can be intricate, and compatibility challenges between legacy systems and cloud platforms may arise.

Conclusion

Legacy hardware continues to be a fundamental element in many organisations, particularly in sectors such as healthcare, logistics, and finance. However, the maintenance of these systems presents distinct hurdles, including compatibility concerns, insufficient vendor support, and escalating security vulnerabilities. While upgrading to new technologies can involve high costs, the potential ROI in terms of enhanced efficiency and security typically makes it a valuable investment. For some, cloud migration provides a feasible path forward, although it necessitates careful planning and resources.

Q&A: Addressing Frequently Asked Questions

Q: Why do certain organisations still depend on legacy hardware?

A:

Some organisations persist in relying on legacy hardware because these systems manage crucial tasks that newer technologies might not yet fully accommodate. Additionally, the costs and risks of transitioning to modern systems can deter some businesses.

Q: What are the main challenges of maintaining legacy systems?

A:

The main challenges encompass compatibility issues with modern technologies, lack of vendor support, and increased security vulnerabilities. These factors often render the maintenance of legacy systems more expensive and complex.

Q: How can organisations enhance the security of their legacy systems?

A:

Organisations can bolster security by introducing additional protective measures, such as firewalls, intrusion detection systems, and regular monitoring. Updating and patching systems regularly, when feasible, is also essential.

Q: Is cloud migration a practical solution for legacy hardware?

A:

Cloud migration can serve as a practical solution, offering scalability, flexibility, and improved security. However, it requires thorough planning, adequate resources, and a clear understanding of the organisation’s specific needs. Compatibility between legacy systems and cloud platforms should also be addressed.

Kim Dotcom Ready for Extradition from New Zealand


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Kim Dotcom Extradition: A Significant Case

Brief Overview

  • Kim Dotcom is set for extradition from New Zealand to the US.
  • The extradition follows an extensive legal struggle dating back to 2012.
  • Executives from Megaupload reportedly led to over US$500 million in losses for studios.
  • The extradition outcome was revealed by the Justice Minister of New Zealand.
  • Plea agreements have already been reached by other executives from Megaupload.

Overview of the Megaupload Situation

Kim Dotcom, a German-born technology entrepreneur and the creator of the file-sharing service Megaupload, is poised for extradition from New Zealand to the United States. This decision follows a drawn-out legal confrontation that has persisted since 2012. Dotcom, a resident of New Zealand, has faced increasing scrutiny after an FBI-initiated raid on his mansion in Auckland, which resulted in his apprehension alongside several other Megaupload executives.

Kim Dotcom extradition from New Zealand

Legal Developments and Extradition

The extradition decree was signed by New Zealand’s Justice Minister, Paul Goldsmith. In his remarks, Goldsmith emphasized that all pertinent details were thoroughly assessed before opting to hand over Dotcom to US officials. Dotcom has been allotted a brief timeframe to pursue legal counsel regarding this ruling.

Dotcom has voiced his opposition to the extradition on social media, labeling New Zealand as an “obedient US colony.” This remark encapsulates the ongoing discourse concerning the extent of international legal pressures on local rulings.

Consequences for the Tech Sector

The allegations against Dotcom and his partners center around claims that Megaupload enabled rampant copyright infringement, leading to financial damages exceeding US$500 million for film studios and record labels. The business model of the site reportedly accrued US$175 million by promoting the sharing and storage of copyrighted works.

In 2012, Megaupload’s chief marketing officer Finn Batato and chief technical officer Mathias Ortmann, along with Dutch national Bram van der Kolk, were also taken into custody. While Ortmann and van der Kolk reached plea agreements resulting in prison sentences in New Zealand, Batato sadly passed away in 2022.

Conclusion

Kim Dotcom’s impending extradition to the US signifies a major milestone in a case that has drawn international focus for more than ten years. As Dotcom readies for trial, the legal terrain of the tech industry continues to transform, highlighting the intricate nature of international copyright regulations and the distribution of digital content.

Questions & Answers

Q: Who is Kim Dotcom?

A: Kim Dotcom is a tech entrepreneur of German origin, renowned for establishing Megaupload, a file-sharing platform. He has been embroiled in an extensive legal battle concerning his extradition to the US.

Q: Why is Kim Dotcom facing extradition?

A: Dotcom is being extradited to address charges related to copyright infringement attributed to Megaupload, which purportedly inflicted substantial financial harm on media companies.

Q: What was the function of Megaupload?

A: Megaupload served as a file-sharing service that permitted users to upload and share files. It was dismantled following claims of facilitating copyright violations.

Q: What outcomes have other Megaupload executives faced legally?

A: Several executives, including Mathias Ortmann and Bram van der Kolk, reached plea bargains resulting in prison sentences in New Zealand, successfully evading extradition to the US.

Q: What has been Kim Dotcom’s response to the extradition decision?

A: Dotcom has conveyed his discontent with the ruling on social media, criticizing New Zealand’s adherence to US extradition requests.

Q: What are the repercussions of this case for the technology sector?

A: This case illustrates the difficulties and nuances of copyright legislation in the modern era, and its verdict may shape future judicial actions regarding digital content sharing.

Stunning Highlights: A Visual Recap of the Skybox and BT Security Roundtable


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Amazing Highlights: Skybox and BT Security Roundtable in Images

Amazing Highlights: Skybox and BT Security Roundtable in Images

Skybox and BT Security Roundtable Highlights

All rights protected. This content may not be published, aired, rewritten, or redistributed in any manner without prior approval.

Your use of this site signifies your acceptance of nextmedia’s Privacy Policy and Terms & Conditions.

Brief Overview

  • Important insights and trends from the Skybox and BT Security roundtable event.
  • Emphasis on cybersecurity strategies for addressing emerging threats.
  • Expert evaluations of the current cybersecurity landscape in Australia.
  • Significance of proactive threat management and risk evaluation.

Notable Insights from the Skybox and BT Security Roundtable

The recent roundtable event organized by Skybox and BT Security convened some of the leading experts in the cybersecurity field. This gathering was crucial, providing a stage for specialists to explore the latest trends, issues, and strategies in cybersecurity.

Cybersecurity Trends and Issues

A key takeaway from the event was the focus on the changing landscape of cyber threats. With the increase in sophisticated cyber-attacks, companies must remain ahead by implementing advanced security solutions. Experts underscored the escalating role of artificial intelligence and machine learning in identifying and neutralizing these threats.

Proactive Threat Management

Proactive threat management was a primary focus during the discussions. The specialists emphasized the necessity for organizations to transition from a reactive to a proactive approach regarding cyber risks. This entails ongoing surveillance, vulnerability evaluations, and regular updates of security measures.

Expert Insights on Cybersecurity in Australia

The roundtable also offered perspectives on the state of cybersecurity in Australia. Experts noted that while Australia has made considerable progress in strengthening its cybersecurity framework, there remains significant work ahead. The necessity for enhanced collaboration between public and private sectors was a recurring theme in the discussions.

Conclusion

The Skybox and BT Security roundtable event was a crucial assembly that illuminated the current and forthcoming state of cybersecurity. Stressing the need for sophisticated security measures and proactive risk management, the event showcased the vital role of technology and collaboration in tackling cyber threats. As cyber risks continue to evolve, such exchanges are crucial for keeping enterprises and individuals informed and equipped.

Q&A

Q: What were the primary subjects discussed at the Skybox and BT Security roundtable?

A: Key subjects included prevailing cybersecurity trends, the significance of proactive threat management, and expert views on the cybersecurity situation in Australia.

Q: Why is proactive threat management crucial?

A: Proactive threat management aids businesses in foreseeing and alleviating cyber risks before they can inflict substantial harm, ensuring a stronger security posture.

Q: In what ways are artificial intelligence and machine learning applied in cybersecurity?

A: AI and machine learning are utilized to efficiently detect and respond to threats by analyzing vast amounts of data and identifying patterns that may signal a cyber attack.

Q: What are the current obstacles in cybersecurity in Australia?

A: Although Australia has advanced in cybersecurity, challenges persist, such as the demand for greater collaboration across sectors and the ongoing enhancement of security measures to adapt to evolving threats.

“Severe Browser Vulnerability Threatens Local Networks with Possible Breaches”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Browser Flaw Puts Local Networks at Risk of Breaches

Quick Read

  • Severe browser flaw known as “0.0.0.0 Day” detected.
  • Impacts MacOS and Linux users, endangering local networks.
  • Originates from varying security implementations across browsers.
  • Google and Apple are issuing patches; Firefox’s solution is underway.
  • Comprehensive fixes anticipated in future browser updates.

New Browser Flaw Puts Local Networks at Risk of Breaches

Severe browser flaw endangers local networks to breaches

Details of the Flaw

Security experts have identified a severe browser vulnerability affecting MacOS and Linux users. Labeled “0.0.0.0 Day,” this defect, found by Oligo Security, reveals a core issue in how browsers process network requests. Oligo states that public sites can utilize the address 0.0.0.0 instead of localhost/127.0.0.1 to interact with services on the local network (localhost), introducing a considerable security threat.

Varied Security Implementations

Oligo Security links this flaw to inconsistent security mechanisms implemented across various browsers, along with a lack of uniformity in the browser sector. This discrepancy permits external sites to interact with local services, which could allow the execution of unverified code on the user’s device.

Responses from Browser Developers

After alerting Chromium, Firefox, and Safari of the flaw in April, the respective development teams recognized the issue and pledged to enact changes. Google and Apple have already made notable progress in addressing the concern.

Google’s Countermeasures

Google’s approach involves restricting access to 0.0.0.0 starting from Chromium 128. This adjustment will be implemented gradually, with a complete solution expected by Chrome 133, at which point the IP address will be entirely blocked for all users of Chrome and Chromium.

Apple’s Initiatives

Apple has also implemented significant revisions to WebKit, the engine driving Safari, to bar access to 0.0.0.0, thereby reducing risk for their users.

Current Progress and Upcoming Updates

Although Google and Apple have made substantial modifications, Firefox users will have to wait a bit longer. The fix for Firefox is in the works and will eventually prohibit 0.0.0.0 at an unspecified future time. Until these updates are fully in place, the vulnerability remains a threat.

Overview

The identification of the “0.0.0.0 Day” flaw has underscored a significant security concern impacting MacOS and Linux users. Due to varied security mechanisms across browsers, this vulnerability permits public websites to connect with local network services, posing a risk of potential breaches. Browser developers are actively developing fixes, with Google and Apple at the forefront. Users are encouraged to keep their browsers updated to maintain system security.

Q&A Section

Q: What is the “0.0.0.0 Day” flaw?

A:

The “0.0.0.0 Day” flaw is a severe issue in how browsers handle network requests, allowing public sites to interact with local network services and potentially run code on the user’s machine.

Q: Who is impacted by this flaw?

A:

This flaw mainly targets MacOS and Linux users due to inconsistent security implementations among various browsers.

Q: What measures are browser developers taking to resolve this issue?

A:

Google is restricting access to 0.0.0.0 starting with Chromium 128, with full implementation anticipated by Chrome 133. Apple has also revised WebKit to block access to 0.0.0.0. Firefox is in the process of developing a fix, which will be launched in the foreseeable future.

Q: How can users safeguard themselves against this vulnerability?

A:

Users should ensure their browsers are kept up-to-date, as browser developers are rolling out fixes for this vulnerability. It’s also wise to keep an eye on official updates from Google, Apple, and Mozilla.

Q: Will this flaw be completely resolved in the future?

A:

Yes, browser developers are diligently working to implement fixes. Google and Apple have already made considerable adjustments, and Firefox is expected to follow shortly. Complete resolution is expected in forthcoming browser updates.

Q: Is there a temporary solution for Firefox users?

A:

While a permanent solution is in development, Firefox users should remain alert and avoid accessing questionable websites. Additionally, utilizing network security tools to observe and block unusual network requests can add an extra layer of defense.

Q: How grave is this flaw?

A:

This flaw is deemed critical as it enables external websites to communicate with local network services, potentially leading to breaches and the execution of arbitrary code on the user’s machine.

Prepared to Drift? JDM Prologue: The Ascent of the Scorpion Debuts on the Tracks Today!


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Game Launch: JDM: Rise of the Scorpion debuts today at 2pm UTC (August 9th at Midnight in Australia).
  • Setting: Takes place in a made-up Japanese prefecture reflecting the mountainous landscapes of Honshu.
  • Licensed Cars: Showcases vehicles from Subaru and Mazda.
  • Events: Features Drift Race, Drift Battle, and Grip Race.
  • Narrative: Follow the path of Hatori Hasashi as he becomes the “Scorpion”.
  • Availability: Accessible on PC via Steam, GoG, and Epic Store.

Ready to Drift? JDM Prologue: Rise of the Scorpion Tracks Released Today!

Ready to Drift? JDM Prologue: Rise of the Scorpion Tracks Released Today!

Introduction to JDM: Rise of the Scorpion

Drift lovers and racing aficionados, make sure to save the date! The highly awaited prologue to JDM: Japanese Drift Master, named “Rise of the Scorpion,” officially releases today at 2pm UTC (that’s Midnight on August 9th in Australia).

Situated in a fabricated Japanese prefecture influenced by the rugged heights of Honshu, this game guarantees an immersive journey filled with licensed vehicles from Subaru and Mazda. Whether you enjoy Drift Races, Drift Battles, or Grip Races, JDM: Rise of the Scorpion caters to every racing enthusiast.

The Narrative of the Game

The prologue unveils the captivating tale of Hatori Hasashi’s evolution into the “Scorpion”. Setting itself apart from typical racing games, JDM: Rise of the Scorpion utilizes manga-style storytelling to illustrate this voyage, adding a distinct and captivating layer to the gameplay.

Core Features

Narrative and Characters

A key highlight of JDM: Rise of the Scorpion is its emphasis on narrative. The game incorporates manga pages to steer players through the story, creating a unique mix of visual novel elements and racing excitement.

World of JDM

Venture into a lively, open-world map inspired by Japan’s legendary drifting paths. From the twisting roads around Haikama Lake to the dense trails within the Tengai Forest, the game presents a broad array of locations to test your drifting prowess.

Drive Licensed Cars

Take control of officially licensed Subaru and Mazda automobiles. Players can also enhance these vehicles with various upgrades to improve both performance and appearance.

New Challenges

Race against AI contenders in numerous drift and grip challenges. The game also presents story-linked events that connect to the main narrative, ensuring the gameplay remains dynamic and intriguing.

Multi-functional Smartphone

The in-game smartphone offers a variety of features, including the ability to check messages, monitor mission statuses, customize wallpapers, and more. It’s a useful resource for tracking your achievements and engaging with the game’s storyline.

Discover New Areas

The game’s open-world format promotes exploration. Unearth new regions and challenging routes, each providing distinctive drifting adventures and chances to highlight your skills.

Availability

JDM: Rise of the Scorpion can be accessed by PC players on Steam, GoG, and the Epic Store. Catch the launch trailer [here](https://www.youtube.com/embed/LiOvNSu4A0w?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-AU&autohide=2&wmode=transparent).

[embedded content]

Summary

JDM: Rise of the Scorpion is geared up to enchant racing and drifting fans with its unique fusion of narrative and adrenaline-pumping racing. With its manga-inspired storyline and diverse offering of events and licensed vehicles, the game provides a rich and engaging experience for players. Now available on PC via Steam, GoG, and Epic Store, it’s a must-play for those eager to step into the realm of Japanese drifting.

FAQs

Q: On which platforms can players access JDM: Rise of the Scorpion?

A:

The game is available on PC through Steam, GoG, and the Epic Store.

Q: When does JDM: Rise of the Scorpion go live in Australia?

A:

The game goes live at Midnight Australian time on August 9th.

Q: What kind of vehicles can players drive?

A:

Players can operate licensed vehicles from Subaru and Mazda.

Q: What events can players participate in?

A:

The game offers Drift Races, Drift Battles, and Grip Races, among various other events.

Q: How does the game incorporate storytelling elements?

A:

The game employs manga pages to narrate the transformation of Hatori Hasashi into the “Scorpion”.

Q: Are there any features to help players monitor their game progress?

A:

Yes, the in-game smartphone enables players to read messages, track mission statuses, change wallpapers, and more.

Q: What unique locations are available for exploration?

A:

Players can explore winding mountain paths around Haikama Lake and intricate trails of the Tengai Forest.

South Australia Transforms Education through Okta’s Digital Identity Solution


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • The South Australian Department for Education has teamed up with Okta to improve security and connectivity in schools.
  • The EdPass project streamlines login procedures, boosting security and the overall experience for both educators and learners.
  • A collaborative approach has ensured customized solutions that cater to the needs of education.
  • The department is adopting AI technologies to facilitate personalized learning and lessen administrative workloads.

South Australia Transforms Education with Okta’s Digital Identity Solutions

South Australia Transforms Education with Okta's Digital Identity Solutions

Revolutionising Educational Technology

The South Australian Department for Education is leading the way in digital innovation, addressing the challenges of school security, connectivity, and user experience, while ensuring “equitable access to digital tools and learning opportunities,” as stated by CIO Daniel Hughes.

EdPass: A Transformative Initiative for School Security

As per Hughes, the EdPass program, which utilizes Okta’s single sign-on technology, has transformed security and access management within schools. “This has increased security while also instilling confidence in educators and school leaders to embrace technology,” he remarked.

By minimizing login effort—requiring teachers to sign in once instead of fifteen times—Okta has fostered a more efficient and secure digital atmosphere. “It has streamlined the digital experience for both students and teachers, enabling them to concentrate on learning rather than administrative chores,” Hughes noted.

Key to this initiative was striking a balance between security and usability. “If it becomes overly restrictive, staff are unlikely to use it. But the technology was simplified enough that we didn’t have to engage in that discussion,” Hughes elaborated, leading to a more secure and user-friendly setting that lets teachers concentrate on their core responsibilities.

Collaborative Strategy

Reflecting on project achievements, Hughes mentioned the success stemmed from a collaborative strategy with Okta, which prioritized cooperation over merely selling a product, focusing on practical solutions that meet educational requirements.

“Unlike conventional commercial partnerships, Okta showed a genuine desire to understand our needs and explore what a meaningful solution would look like for our students and staff throughout the state. Their sincere interest in making a difference was refreshing,” Hughes remarked.

Furthermore, Okta’s head of public sector, James Enoch, noted that this collaborative strategy has improved teachers’ login experiences—providing them with smooth and secure access—and has also balanced the resources available across all schools in the state. “We have implemented a unified authentication system for students in 900 schools, ensuring uniform access to digital resources, whether they are from a large urban school or a small rural one. This uniformity directly enhances their learning experience,” Enoch stated.

“These advantages are substantial and mark a significant step forward for educational technology on a national scale. The department has truly established a new benchmark for what can be achieved in this sector,” Enoch added.

Innovations and Future Visions with AI

Simultaneously, the department’s adoption of AI technologies, like EdChat, highlights its commitment to innovative education, Hughes noted. “These tools facilitate personalized learning and help alleviate teachers’ administrative tasks, allowing them more time for individual instruction,” he explained.

Enoch from Okta concurred, underscoring the transformational potential of these innovations: “AI and wearable technology are not merely trends. They are tools which, when implemented thoughtfully, can greatly enhance the learning experience and give educators more time to address individual student needs.”

Conclusion

The South Australian Department for Education, in collaboration with Okta, has made significant improvements in school security, connectivity, and user experience through initiatives like EdPass. The emphasis on collaboration and the integration of AI technologies reflect the department’s commitment to providing equitable access to digital resources and innovative educational experiences.

Q&A

Q: What is EdPass?

A: EdPass is an initiative powered by Okta’s single sign-on solution that simplifies login procedures for educators and students, thereby enhancing security and user experience within schools.

Q: How has Okta advanced the digital environment in South Australian schools?

A: Okta has optimized authentication processes, reducing the time teachers dedicate to logging in and facilitating a more efficient and secure digital setting.

Q: What distinguishes the partnership between the South Australian Department for Education and Okta?

A: The uniqueness lies in the collaborative approach. Okta engaged with the department to comprehend their specific context and requirements, leading to customized and impactful solutions.

Q: How is AI being utilized by the South Australian Department for Education?

A: AI technologies, including EdChat, are employed to support personalized learning and lessen administrative tasks, enabling teachers to dedicate more time to individual instruction.

Q: What advantages have been observed from the unified authentication system?

A: The unified authentication system guarantees that students across both metropolitan and rural schools have equal access to digital resources, thus enhancing their educational experience.

Q: What future aspirations does the South Australian Department for Education have for digital innovation?

A: The department intends to continue adopting AI and wearable technologies to improve the learning experience and provide educators with additional time to focus on student needs.

Microsoft’s Cloud Growth Slows: AI Benefits to Take More Time


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Microsoft’s Cloud Growth Slows: AI Returns Expected to Take Longer

Microsoft’s Cloud Growth Slows: AI Returns Expected to Take Longer

Quick Read

  • Microsoft plans to enhance its investment in AI infrastructure despite the slower growth of its cloud services.
  • Capital investments surged by 77.6%, reaching US$19 billion for the fiscal fourth quarter.
  • Cloud growth in Azure is anticipated to gain momentum in the latter half of fiscal 2025.
  • AI services added 8 percentage points to the revenue growth of Azure in the June quarter.
  • CEO Satya Nadella noted a nearly 60% year-on-year rise in Azure AI usage.
  • Overall revenue for Microsoft climbed 15% to US$64.7 billion in the fourth quarter.
Microsoft's decelerating cloud growth suggests AI returns will require more time

Boosted AI Investments Despite Sluggish Cloud Growth

Microsoft has revealed its plans to substantially increase spending on AI infrastructure this fiscal year, even though growth in its cloud services shows signs of slowing. This decision implies that the rewards from its significant investments in AI technology may take longer to materialize than early projections by Wall Street investors suggested.

Market Response

After the announcement, Microsoft shares dipped by seven percent initially but rebounded slightly to close down by four percent. The company suggested that growth in Azure cloud services is set to pick up in the second part of fiscal 2025.

Major Tech Companies Investing Heavily in AI

Microsoft isn’t the only tech giant pouring resources into AI. Alphabet, Google’s parent company, has recently cautioned that its capital spending will remain high throughout the year. Microsoft reported a 77.6% increase in capital expenditures to US$19 billion for its fiscal fourth quarter concluding June 30, with cloud and AI-focused investments constituting a significant portion of this expense. For fiscal year 2024, total capital expenditure reached US$55.7 billion.

Investor Perspectives

Even with the increased outlay, investors who have driven Microsoft’s stock up nearly 25 percent over the past year on AI optimism were left dissatisfied with the slower growth reported for Azure. Microsoft forecasts that Azure’s growth will range between 28 percent and 29 percent for the July-September quarter, slightly falling short of the 29.7 percent growth expectation.

The Growing Role of Azure AI

Although overall Azure growth has slowed, AI services have contributed more significantly to revenue growth in the June quarter, contributing 8 percentage points compared to 7 percentage points in the prior quarter. CEO Satya Nadella stated that more than 60,000 customers are now utilizing Azure AI, reflecting an almost 60% year-on-year increase, with average spending per customer also on the rise.

AI Integration in Microsoft’s Offerings

Nadella has been advocating for the incorporation of AI into nearly all Microsoft products, from the Bing search engine to productivity applications like Word. A substantial portion of these efforts is powered by technology from OpenAI, in which Microsoft has invested around US$13 billion.

Financial Overview

Microsoft’s productivity segment, which encompasses the Office suite, LinkedIn, and 365 Copilot, experienced an 11 percent growth, exceeding the 10 percent expectations. Revenue from the Intelligent Cloud segment increased by 19 percent to US$28.5 billion, slightly missing analysts’ projections of US$28.68 billion. Overall, Microsoft’s total revenue grew by 15 percent to US$64.7 billion in the fourth quarter, surpassing analysts’ predictions.

Performance of Personal Computing Division

The personal computing division, covering Windows, Xbox, and Surface devices, recorded a 14 percent growth, benefiting from recovering PC sales. IDC indicated that the PC market witnessed growth for the second consecutive quarter during the April-June period.

Conclusion

Microsoft’s bold initiative to enhance its AI infrastructure, despite the deceleration in its cloud services, highlights the company’s long-term strategy and dedication to AI-centric solutions. While market reactions have been mixed, the potential for future growth remains robust, particularly as Azure AI gains increased traction among users.

Q: Why is Microsoft boosting its AI infrastructure investment?

A: Microsoft is increasing its AI investments to address the rising demand for AI solutions and to leverage the burgeoning interest in generative AI technologies.

Q: What was the market’s reaction to Microsoft’s announcement?

A: Initially, Microsoft’s shares dropped seven percent but later slightly recovered, settling down four percent after the company hinted at future Azure cloud growth.

Q: How did AI services impact Azure’s revenue growth?

A: AI services provided 8 percentage points to Azure’s revenue growth in the June quarter, an increase from 7 percentage points in the earlier quarter.

Q: How significant is Microsoft’s investment in OpenAI?

A: Microsoft has invested about US$13 billion in OpenAI, which has played a crucial role in enabling AI functionalities across Microsoft’s products.

Q: What are expectations for Azure’s upcoming growth?

A: Microsoft projects that Azure’s cloud growth will pick up in the latter half of fiscal 2025, predicting growth rates between 28 and 29 percent in the pending quarters.

Q: How did the productivity and personal computing sectors perform?

A: The productivity sector expanded by 11 percent, surpassing forecasts, while the personal computing sector grew by 14 percent, benefiting from stabilising PC sales.

Q: What does the overall financial outlook look like for Microsoft?

A: Microsoft’s total revenue increased by 15 percent to US$64.7 billion in the fourth quarter, exceeding analysts’ expectations, reflecting strong financial health.

“`

Toyota Partners with Stanford to Create Self-Driving Drift Vehicles


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Toyota and Stanford’s Revolutionary Autonomous Drift Car Partnership

Toyota and Stanford’s Revolutionary Autonomous Drift Car Partnership

Quick Overview

  • Toyota Research Institute and Stanford Engineering realized the first-ever fully autonomous tandem drift.
  • The demonstration occurred at Thunderhill Raceway in California.
  • Both lead and following vehicles were equipped with AI-powered autonomous technology.
  • The objective is to enhance AI’s capacity for vehicle safety and control.
  • Researchers implemented neural networks for vehicle simulation.
  • This technology could be adapted for urban driving situations.

First-ever Fully Autonomous Tandem Drift

This week, Stanford Engineering alongside the Toyota Research Institute unveiled a groundbreaking video that displays two autonomous cars drifting in parallel. This accomplishment signifies the world’s first fully autonomous tandem drift, marking a notable advancement in artificial intelligence and vehicle safety.

The Thunderhill Raceway Event

The event was held on the skid pan at Thunderhill Raceway, situated 7 miles west of Willows, California, in the Sacramento Valley. Both the leading and trailing vehicles featured cutting-edge autonomous software, enabling them to execute the drift autonomously.

[embedded content]

Toyota and Stanford Create Autonomous Drift Cars

AI’s Role in Controlling the Drift

The initiation and management of the drift are achieved by continuously adjusting the steering and throttle inputs, all governed by AI. The lead vehicle is tasked with path planning while the following car closely trails, navigating around the lead. This intricate maneuver highlights AI’s skills in real-time vehicle management.

Technology Insights

Trey Weber from Stanford Engineering describes their use of a neural network vehicle model, opting for data-driven learning instead of manually tuning the system. Chris Gerdes, a Mechanical Engineering Professor at Stanford University, remarks on their transition from skepticism regarding AI to acknowledging its crucial role in this success.

“We believe what we’ve accomplished here can be scaled to address larger challenges like automated driving in urban environments”

Consequences for Vehicle Safety

While drifting is typically viewed as an impressive showcase of driving prowess, the foundational technology could yield significant benefits for vehicle safety. By mastering extreme control techniques, researchers aim to bolster safety features in routine driving conditions. The integration of AI and computer vision with neural networks is already enabling autonomous navigation, making this accomplishment a substantial progression.

Conclusion

Stanford Engineering and the Toyota Research Institute have effectively showcased the world’s inaugural fully autonomous tandem drift. This groundbreaking achievement not only demonstrates AI’s potential in vehicle control but also opens avenues for improved vehicle safety in typical driving situations.

Q: What was the purpose of the autonomous tandem drift?

A: The purpose was to enhance AI’s capabilities for advancing vehicle safety and control.

Q: Where was the event held?

A: The event was conducted at Thunderhill Raceway in California.

Q: Which technology facilitated the drift?

A: The vehicles utilized AI-powered autonomous software that regulated steering and throttle inputs.

Q: Who were the main researchers on the project?

A: Trey Weber from Stanford Engineering and Chris Gerdes, a Mechanical Engineering Professor at Stanford University, were key contributors.

Q: How might this technology be utilized in the future?

A: This technology could be adapted for urban driving scenarios, improving vehicle safety and autonomy.

Q: What are the safety implications?

A: Mastery of control in challenging conditions like drifting could enhance safety features in everyday driving environments.

For additional details, visit TechBest.