The term “metaverse” first appeared in 1992 in a dystopian novel entitled “Snow Crash” by US science fiction author Neal Stephenson. In the book, the metaverse – think roleplaying crossed with multiplayer online gaming – represents a virtual place of refuge for the protagonists who are struggling to make their way through an apocalyptic world. An early […]
Show Post ›The “mining” of cryptocurrencies, i.e., creating new currency units and validating transactions in the blockchain, is associated with a very high level of technical sophistication. To perform the complex processing operations at the required speed – in other words, the hash rate – the hardware used (powerful CPUs, GPUs or specialized ASIC boards) is either […]
Show Post ›High-quality software has its price – although many users aren’t prepared to pay it. A BSA study conducted in 2017 found that around 20 percent of software in Germany was unlicensed. While Germany is far from being a global leader in software piracy – the corresponding figure was 66 percent in China and 62 percent in […]
Show Post ›There’s no PC or Mac user on the planet who wouldn’t be curious about the new features the latest release of their favourite operating system has to offer. For the Mac community, the recently staged Worldwide Developers Conference (WWDC) 2022 provided some facts to stir this curiosity even further. It seems that the newly christened […]
Show Post ›A group of Chinese cyber-criminals are operating under the name “Storm Cloud” and threat analysts are concerned by their extraordinary skills. This was the opinion of American cyber security company Volexity which was the first to discover malware developed by Storm Cloud that was previously unknown but is “highly developed with a lot of varied […]
Show Post ›By Candid Wüst “Watering hole attacks” are among the most perfidious of attack strategies: Like lions at a watering hole on the African savannah, cyber-criminals hide behind pages previously infected with malware that are visited frequently or are highly likely to be visited by the target group of the attack. The particular risk of this […]
Show Post ›Using widespread surveys, Acronis regularly records how individuals and companies handle their digital data. The picture they paint is not particularly rosy; neglecting data backups tends to be the rule rather than the exception for both user groups. In the most recent survey fully 68% of private users admitted that they have lost data due […]
Show Post ›Above-average salaries, varied tasks, and excellent career opportunities make Lockheed Martin Corporation one of the most attractive employers in the United States. So, if a job offer from the sought-after employer lands in someone’s personal inbox, only a few of those chosen to receive the email would refrain from taking a look at it. This […]
Show Post ›Alongside most of humanity we at Acronis are also outraged and deeply concerned by the Russian attack on Ukraine. We support the people in this country fighting for its freedom and call for peace to return to the region. At the same time we have joined the sanctions that have been imposed and are stopping […]
Show Post ›Mass storage and toasters have one thing in common: they break down occasionally. But if such an issue befalls your toaster it at worst results in a less tasty breakfast, but the consequences of a hard drive or SSD crash can be incomparably more dramatic. In the very worst case scenario irreplaceable data is lost […]
Show Post ›