Connect with us

Microsoft

Windows 10X Development Stopped Before Release

Chris Rausch

Published

on

We may earn a small commission when you click or purchase an item using a link on this website.


Windows 10 is the most widely used operating system in the world. However, because it was designed primarily for standard PC usage, it is not the most versatile option for alternative orientations like dual or foldable screens. To combat this, Windows 10X was developed.

Windows 10X started as a Chromium-based operating system for dual-screen and foldable laptops. It was designed to work with touch screens and alternative display configurations, allowing the operating system to make the most of the advantages dual and foldable screens provided. The original release date was planned for Fall 2020, but in the midst of the COVID pandemic, Microsoft announced that it would instead change focus to single-screen computers that lacked sufficient hardware to make the most out of Windows 10. It was built to be lighter and more flexible, making use of the cloud to maximize the functionality at a lower resource requirement.


Now, the development of Windows 10X has been shelved entirely in favor of focusing more on Windows 10 and the upcoming Sun Valley update expected later this year. This update intends to make the operating system more user friendly, modern, and reliable for the over 1.3 million PCs using Windows 10. It may also be a step towards making Windows 10 more versatile, and it wouldn’t be a surprise to see certain Windows 10X features make their way into Windows 10 in the future. Currently, rounded windows and new icons are just a few changes seen in Windows 10X previews that are also expected in the Sun Valley update.

As technology advances, there is certain to be a need for a variation of Windows 10 or a more versatile core operating system that works for all levels and types of PCs. But for now, it appears Microsoft’s flagship operating system will be the horse they back for the battle against Google’s Chromium operating system. Fortunately, they have a major head start at nearly 40 times the usage as of 2020.

In my 4+ years as a professional tech copywriter, I've written about everything from laptops & routers to the software that facilitates billions in online sales each day. If it relates to, connects to, or belongs on the Internet, I'm in. Equipped with my Associate's in Computer Science and a computer I assembled myself (no big deal), I write about all things hardware, software, gaming, and digital tech to keep you up-to-date on important news, releases, and tips & tricks.

Continue Reading
Advertisement
Click to comment
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Cybersecurity

How to Protect Your Windows PC from Ransomware Attacks

Tara Ragone

Published

on

It is fair to say that Windows applications are installed in more than half of all PCs, which means that devices with this software may be at a greater risk of contracting a virus or becoming the target of a ransomware attack compared to their opponents. The good news is that Windows systems are equipped with internal safeguards that can help you steer away from ransomware threats.

Adhering to the below recommendations should be helpful in your efforts to protect your Windows PC from malicious activity:


  • Staying up to Date: When updates become available the latest version should be downloaded. Restarting your computer at least one time a week ensures updates are consistently made.
  • Security: Windows offers a security feature that must be turned on in order to work (or Windows Defender Security in older versions). Windows 10 adds an additional layer of protection specifically for your folders that can be found at the end of the following chain of settings: update & security>windows security>virus & threat protection>virus & threat protection settings>manage settings>controlled folder access.
  • Back Up: Backing up your files is a wise move to make so that in the case a ransomware hacker gains unauthorized access you have an alternative method to reach your property.
  • OneDrive: Storing your files in OneDrive provides automatic protection against ransomware because it has the ability to detect such dangers and also has recovery tools in place. 

Ransomware attack susceptibility can also be majorly reduced by remaining vigilant about visiting unfamiliar websites, opening attachments/emails you were not expecting from someone or an organization that is not recognized, and clicking suspicious links on social media sites or other webpages. Furthermore, taking the time to self-educate on ransomware safety and performing backups on a daily basis are steps to take that may give you the upper hand if an unfortunate incident does affect you.

Sometimes leaning on external controls aside from the basics is necessary for sufficient protection against ransomware attacks, especially when highly important files and information are at stake.

Continue Reading

Consoles

Xbox Cloud Gaming Officially Available for PCs, Tablets, and Phones

Chris Rausch

Published

on

While the hype of Windows 11 is understandably controlling the spotlight for Microsoft, the future of gaming is quietly expanding in the background.

Xbox Cloud Gaming – originally xCloud – is the name of the cloud-based gaming program that allows gamers to access and stream games directly to their PC, tablet, or laptop through the cloud. Games are played at an Xbox datacenter instead of locally. This means users’ devices will only have to process video streaming and controller inputs, removing the Xbox hardware requirement and allowing lower-end devices to still get the optimal experience without hogging all the CPU and GPU resources.


As of June 28th, Microsoft’s Xbox Cloud Gaming technology has graduated from closed beta testing and backdoor access to a publicly live beta for the most popular platforms. Xbox released the full web app to the public at xbox.com/play where any device that can use a web browser can act as a virtual Xbox Series X to play any of the 300+ Xbox Game Pass titles. The Microsoft account user must be subscribed to Xbox Game Pass Ultimate to access the full library, but if it is available, the game can be played in any supported browser on any supported device.

Xbox Cloud Gaming is currently supported on Windows 10 PCs, iOS devices, and Android devices through browsers. Tablet and mobile devices may also use an app to access the web app, which was previously the only way to access the service when it was in beta. Many games will require a controller for optimal performance (either wireless or wired depending on the device), but controller emulators are expected to roll out for certain devices to make gaming even more mobile and compact.

Continue Reading

Cybersecurity

At Least 700 Million LinkedIn Accounts Breached and Exploited on the Dark Web

Tara Ragone

Published

on

It has come to light that an astonishing 92% (700 million) of LinkedIn users’ accounts have been breached and robbed of their personal data, which included confidential phone numbers, salaries, and addresses. The number of affected profiles is extremely alarming considering it accounts for nearly the entire platform’s patrons, which is said to be approximately 756 million. Further examinations of the unauthorized information that was revealed shows that email addresses, full names, genders, and other social media platform identities were also exposed. 

One million records were posted on the dark web for illicit consumers to browse and purchase at their leisure. An author named Restore Privacy stated they personally verified through a meticulous analysis that the data being sold was indeed current and tied to real individuals. It turns out that just months ago LinkedIn suffered a similar data breach that had impacted 500 million of their users. LinkedIn is apparently claiming that their networks have not been targeted and that there is no certainty as to whether the stolen data being made publicly visible is actually from prior thefts. 


Fortunately, extremely sensitive information such as credit card numbers and private messages are not believed to be included in this hacking scheme. However, it is feared that serious incidents regarding identity theft and financial spam attacks could potentially become issues based on the data that has been placed in the illegal market. Personal aim toward victims would not be unlikely to come from this mishap in the form of phishing attacks, ransomware demands, and intentional device infections.

While it may seem like the information taken away by the hackers is not voluminous enough to get much else, it could in reality lead to other major hacks and additional criminal acts on the same people. The possible negative outcomes resulting from this breach are heightened by the thought that stalkers and even burglars could utilize the data to carry out frightening physical crimes offline. This event has triggered recommendations of routinely turning off all location accessibility for social media apps through one’s phone settings.

Continue Reading
Advertisement

Sign Up For The Latest Bite Sized Tech News


Trending

0
Would love your thoughts, please comment.x
()
x