Technology
Innovation of Computers Which Changed the World & The World of Cyber Threats

As of now, the corporate sector is experiencing the advantages of computer reduction and greater mobility.
As computers, netbooks, PDAs, and smartphones have grown more and more commonplace, it has become easier to work while on the go, blurring the barrier between work and home life.
Trends in computers, we do our best to look forward one year at a time and identify the major technological developments that will have a significant impact over the next months.
If we are talking about the revolution, it’s like a moment in time at which computers bring about substantial changes to human civilization is referred to as a computer revolution.
There has been a shift from mechanical and analog electrical technologies to electronic ones, beginning in the late twentieth century, as computers and digital record-keeping became more widely accepted today.
Evolution of Technology
· First PC And Digitilization
In 1972, the microprocessor was created, and the power of computers soared while their size decreased significantly.
With computing on a little chip, personal computers might be accessible to the public. This was the first time that personal computers could be offered to the general public as a product.
IBM produced the IBM PC in 1981, and Steve Jobs followed up with Apple Computer and its “Macintosh” series. (Wegberg, M. (n.d.). Evolution and Competition in the Market for Handheld Computers. Core.Com. Retrieved August 22, 2019)
· Microsoft and Apple War: The Change of Revolution In the Computer Industry
In the 1980s and 1990s, computer innovation concentrated on hardware and software. Because of Windows, computers became more widely available to the general public and enterprises. To make things like logos, product designs, word processing, report compilation, and the increasingly complicated computations required by the high-tech sector, computers were frequently being utilized by this point.
The Apple and Microsoft war in the Market Started back in the 90s when apple followed the UNIX Gui and Program it to develop their Operating System; Apple’s rapid growth and collapse. Newton is a fascinating example of how the mobile industry has evolved.
According to a Moscow report, handwriting recognition is Newton’s defining feature. In contrast, Apple licensed the Newton system on their Macintosh operating system. When it was first released, the Newton cost a hefty $699. The only way to enter data was using a mouse. The lack of a keyboard has the benefit of reducing the overall size of the Newton, though. The Newton technique was not part of Apple’s long-term strategy.
Apple raised many hopes for the Newton before it was even released. Apple is also a concern as it has a minimal relationship with the industrial computer industry.
Sharp has lent its support, but Microsoft has the backing of many industry giants. Because of Apple’s difficulties developing and promoting the Newton, competitors were given an opening. In 1996, HP introduced the Graffiti handwriting recognition software together with the GEOS operating system. It is clear from the PalmPilot’s popularity that Apple’s product lacked coherence: restricted options at a premium price.
Pen-based computers made by Microsoft, on the other hand, were the first to arrive on the market. Developing a portable computer around its software was the only economically viable option for Palm Computer. As a result of the Pilot’s popularity, many competitors have emerged. At least two attempts were made by Microsoft to fit the 16-bit Windows 3.1 operating system into a tiny space.
Modular Windows, an operating system for interactive television, and Win pad, an operating system for portable devices, were both created by it by 1992. To further extend its dominance in PCs onto handhelds, it created Microsoft Windows for Pen Computing. Intel CPUs and their corresponding memory requirements.
Windows exceeds the limitations of a portable computer. Operating systems for portable computers based on Windows 95 or Windows NT. Three operating systems have been replaced by Microsoft’s Windows CE approach.
The Psion Series 3a handheld was released in 1993, five years before introducing the Windows CE 2.0 portable. (Wegberg, M. (n.d.). Evolution and Competition in the Market for Handheld Computers. Core.Com. Retrieved August 22, 2019)
Business, Computers & Internet
The widespread usage of the Internet in the late 1990s led to an explosion of efficiency improvements, including the capacity to coordinate design, manufacture, distribution, and sales via computer systems and the networks that linked them. As a result of real-time global commerce, national governments’ influence was reduced.
As bandwidths increased, teleconferencing and telecommuting became inexpensive and effective, enabling outsourcing and other 21st-century commercial practices.
Problem Statement
As the world is moving towards advanced technologies in 21st century, The protection of sensitive information is one of the primary concerns of any government, particularly given the increasing prevalence of digital formats and cyberspace for the storage and transmission of data throughout the globe.
Cybersecurity is essential for today’s businesses as the world is growing in the technology sector and expanding. Theft of proprietary data, identity theft, and other cybercrimes are rampant, costing organizations millions of dollars each year.
People should be able to feel comfortable while connecting with other users anywhere around the globe, which is made possible by many of the social media platforms available today and security solutions.
The illegal activities discussed here have as their primary objective social media platforms to access confidential information and target different organizations. In addition to using social media, users looked for advice on how to exercise the necessary level of care while doing other kinds of transactions online, such as banking transactions.
References: europarl.europa.eu
Problems Faced in Cybersecurity
In general, there are two different sorts of risks associated with cybersecurity. The first of these risks is known as actioned means, for they are suggested to create bad effects on digital media systems. The second type of risk is known as some course of action, which is a necessity for exploiting the infrastructure of cyber or some harmful purposes without having any kind of damage which may have the repercussions at once result on the functioning of a system like there was a Trojan Horse, and it is beneficial for making negative impacts.
The purpose of passing on uncertain messages that link political and detest discourse, supplying suggestive excitement to minors, and having an infringement of copyrights are all examples of ways that the Internet and other forms of digital media may be used inappropriately. Other ways that the Internet can be misused include using it to submit any extortion like taking, planning mental oppressor, and having an entrance of copyrights.
Objective of Research
Endpoint Solutions Security AI-Based Applications
To automate the threats, programming devices are being used. With this product and preconfigured cyberattacks, a single guilty person may attack several PC frameworks in a single day by using a single PC. If the guilty person can access at least one computer.
Not all assaults are successful since most products are readily accessible, but the method for cyberattacks is effective. The AI-Based Software Solutions like Endpoint Security offered by several companies like Microsoft, Fire eye, Kaspersky, and some others which helps organizations gets secured and Most Advanced Version Self Learning AI Based Technology.
When clients update their systems and applications often, they reduce the risk of becoming victims of these large-scale assaults since the business also does security software inspections and plans for them in advance.
Question Research
- In what ways will cyber security evolve over time?
- What are some of the biggest hurdles to adopting cybersecurity?
- In 2022, what are the most serious cybersecurity threats?
- What are the most essential features of cyber security?
- Exactly what kinds of companies are most vulnerable to a cyberattack?
- What are the Future of Upcoming Computers?
Methodology:
In recent years, businesses have become increasingly reliant on technology. From online banking and shopping to using cloud-based storage, businesses rely on technology for almost everything. This makes businesses a prime target for cyberattacks.
A cyberattack can cause significant financial damage, jeopardize the safety of employees and customers, and damage a company’s reputation. The most serious cybersecurity threats are Phishing Attacks, Malware Attacks, Ransomware, Weak Passwords, and Insider Threats, and There are a lot of methods that is invented.
Despite the risks, many businesses do not take the necessary precautions to protect themselves from cyberattacks.
One reason for this is that many business owners underestimate the risk of a cyberattack or do not understand the magnitude of the damage that can be caused.
Another reason is that businesses often do not have the budget to invest in cybersecurity measures.
However, it is important for businesses to realize that cybersecurity is not an option but rather a necessity in today’s world.
Microsoft and other companies have developed advanced AI Based Security Solutions for Corporations and Organizations in order to protect:
It is the goal to introduce additional design phase efforts for new cyber physical systems with a fast and efficient procedure that satisfies the system’s cyber security needs.
When designing a new system, the various components of cyber security (e.g., cyber-attack protection, cyber-attack resilience) should be combined in order to get the optimum results. Important early choices about system architecture may be made at this phase of the system design process. Some examples of these initial decisions include the following:
- The separation and isolation of hardware and software that supports distinct system functions;
- History of cyber assaults must be considered while purchasing off-the-shelf items.
- With particular solutions to be picked after the concept is mature, reliance on defensive capabilities
- When developing a new system, how much attention and resources should be placed on the software development process? (Quality assurance tools, testing, developer skills, life cycle support, etc.),
- Specification requirements for resilience-related capabilities, both present and future, in order to make it easier to add more capabilities in the future.
- Taking into account the characteristics of resilience that are connected to the operator via the use of fast prototyping trials and exercise-related support tools.
Data Analysis:

Reference: voxeu.org
Reference: Bitdefender
Cyber Attacks Worldwide Graph

Reference: IBM Security
Conclusion
Because of the increasing global connectivity, the issue of cybersecurity has become more important.
More and more important transactions are being carried out on personal computer systems. Companies are being forced to consider the safety of their computer systems because of the proliferation of innovative technologies, the development of more advanced digital security tools, and the daily discovery of new digital threats.
As a result, these companies require advanced platforms and tools to secure their computer systems.
There is currently no conclusive response available to digital assaults. In any event, we need to do all in our power to reduce the amount of cybercrime.
References
- https://core.ac.uk/download/pdf/6908827.pdf
- https://www.europarl.europa.eu/news/en/headlines/society/20220120STO21428/cybersecurity-main-and-emerging-threats-in-2021-infographic
- https://www.microsoft.com/en-ww/security/business/microsoft-endpoint-manager
- https://www.cio.com/article/242299/history-of-apple-and-microsoft-4-decades-of-peaks-and-valleys.html
- https://www.kaspersky.com/small-to-medium-business-security
- https://dl.acm.org/doi/abs/10.1145/3327960.3332393
- https://apps.dtic.mil/sti/pdfs/AD1057439.pdf
- https://voxeu.org/article/anatomy-cyber-risk
Research and Term Paper By Ali Ahmed (Author) – NU
Technology
Pintarnya raises $16.7M to power jobs and financial services in Indonesia

Pintarnya, an Indonesian employment platform that goes beyond job matching by offering financial services along with full-time and side-gig opportunities, said it has raised a $16.7 million Series A round.
The funding was led by Square Peg with participation from existing investors Vertex Venture Southeast Asia & India and East Ventures.
Ghirish Pokardas, Nelly Nurmalasari, and Henry Hendrawan founded Pintarnya in 2022 to tackle two of the biggest challenges Indonesians face daily: earning enough and borrowing responsibly.
“Traditionally, mass workers in Indonesia find jobs offline through job fairs or word of mouth, with employers buried in paper applications and candidates rarely hearing back. For borrowing, their options are often limited to family/friend or predatory lenders with harsh collection practices,” Henry Hendrawan, co-founder of Pintarnya, told TechCrunch. “We digitize job matching with AI to make hiring faster and we provide workers with safer, healthier lending options — designed around what they can reasonably afford, rather than pushing them deeper into debt.”
Around 59% of Indonesia’s 150 million workforce is employed in the informal sector, highlighting the difficulties these workers encounter in accessing formal financial services because they lack verifiable income and official employment documentation.
Pintarnya tackles this challenge by partnering with asset-backed lenders to offer secured loans, using collateral such as gold, electronics, or vehicles, Hendrawan added.
Since its seed funding in 2022, the platform currently serves over 10 million job seeker users and 40,000 employers nationwide. Its revenue has increased almost fivefold year-over-year and expects to reach break-even by the end of the year, Hendrawn noted. Pintarnya primarily serves users aged 21 to 40, most of whom have a high school education or a diploma below university level. The startup aims to focus on this underserved segment, given the large population of blue-collar and informal workers in Indonesia.
Techcrunch event
San Francisco
|
October 27-29, 2025
“Through the journey of building employment services, we discovered that our users needed more than just jobs — they needed access to financial services that traditional banks couldn’t provide,” said Hendrawan. “We digitize job matching with AI to make hiring faster and we provide workers with safer, healthier lending options — designed around what they can reasonably afford, rather than pushing them deeper into debt.”

While Indonesia already has job platforms like JobStreet, Kalibrr, and Glints, these primarily cater to white-collar roles, which represent only a small portion of the workforce, according to Hendrawan. Pintarnya’s platform is designed specifically for blue-collar workers, offering tailored experiences such as quick-apply options for walk-in interviews, affordable e-learning on relevant skills, in-app opportunities for supplemental income, and seamless connections to financial services like loans.
The same trend is evident in Indonesia’s fintech sector, which similarly caters to white-collar or upper-middle-class consumers. Conventional credit scoring models for loans, which rely on steady monthly income and bank account activity, often leave blue-collar workers overlooked by existing fintech providers, Hendrawan explained.
When asked about which fintech services are most in demand, Hendrawan mentioned, “Given their employment status, lending is the most in-demand financial service for Pintarnya’s users today. We are planning to ‘graduate’ them to micro-savings and investments down the road through innovative products with our partners.”
The new funding will enable Pintarnya to strengthen its platform technology and broaden its financial service offerings through strategic partnerships. With most Indonesian workers employed in blue-collar and informal sectors, the co-founders see substantial growth opportunities in the local market. Leveraging their extensive experience in managing businesses across Southeast Asia, they are also open to exploring regional expansion when the timing is right.
“Our vision is for Pintarnya to be the everyday companion that empowers Indonesians to not only make ends meet today, but also plan, grow, and upgrade their lives tomorrow … In five years, we see Pintarnya as the go-to super app for Indonesia’s workers, not just for earning income, but as a trusted partner throughout their life journey,” Hendrawan said. “We want to be the first stop when someone is looking for work, a place that helps them upgrade their skills, and a reliable guide as they make financial decisions.”
Technology
OpenAI warns against SPVs and other ‘unauthorized’ investments

In a new blog post, OpenAI warns against “unauthorized opportunities to gain exposure to OpenAI through a variety of means,” including special purpose vehicles, known as SPVs.
“We urge you to be careful if you are contacted by a firm that purports to have access to OpenAI, including through the sale of an SPV interest with exposure to OpenAI equity,” the company writes. The blog post acknowledges that “not every offer of OpenAI equity […] is problematic” but says firms may be “attempting to circumvent our transfer restrictions.”
“If so, the sale will not be recognized and carry no economic value to you,” OpenAI says.
Investors have increasingly used SPVs (which pool money for one-off investments) as a way to buy into hot AI startups, prompting other VCs to criticize them as a vehicle for “tourist chumps.”
Business Insider reports that OpenAI isn’t the only major AI company looking to crack down on SPVs, with Anthropic reportedly telling Menlo Ventures it must use its own capital, not an SPV, to invest in an upcoming round.
Technology
Meta partners with Midjourney on AI image and video models

Meta is partnering with Midjourney to license the startup’s AI image and video generation technology, Meta Chief AI Officer Alexandr Wang announced Friday in a post on Threads. Wang says Meta’s research teams will collaborate with Midjourney to bring its technology into future AI models and products.
“To ensure Meta is able to deliver the best possible products for people it will require taking an all-of-the-above approach,” Wang said. “This means world-class talent, ambitious compute roadmap, and working with the best players across the industry.”
The Midjourney partnership could help Meta develop products that compete with industry-leading AI image and video models, such as OpenAI’s Sora, Black Forest Lab’s Flux, and Google’s Veo. Last year, Meta rolled out its own AI image generation tool, Imagine, into several of its products, including Facebook, Instagram, and Messenger. Meta also has an AI video generation tool, Movie Gen, that allows users to create videos from prompts.
The licensing agreement with Midjourney marks Meta’s latest deal to get ahead in the AI race. Earlier this year, CEO Mark Zuckerberg went on a hiring spree for AI talent, offering some researchers compensation packages worth upwards of $100 million. The social media giant also invested $14 billion in Scale AI, and acquired the AI voice startup Play AI.
Meta has held talks with several other leading AI labs about other acquisitions, and Zuckerberg even spoke with Elon Musk about joining his $97 billion takeover bid of OpenAI (Meta ultimately did not join the offer, and OpenAI denied Musk’s bid).
While the terms of Meta’s deal with Midjourney remain unknown, the startup’s CEO, David Holz, said in a post on X that his company remains independent with no investors; Midjourney is one of the few leading AI model developers that has never taken on outside funding. At one point, Meta talked with Midjourney about acquiring the startup, according to Upstarts Media.
Midjourney was founded in 2022 and quickly became a leader in the AI image generation space for its realistic, unique style. By 2023, the startup was reportedly on pace to generate $200 million in revenue. The startup sells subscriptions starting at $10 per month. It offers pricier tiers, which offer more AI image generations, that cost as much as $120 per month. In June, the startup released its first AI video model, V1.
Techcrunch event
San Francisco
|
October 27-29, 2025
Meta’s partnership with Midjourney comes just two months after the startup was sued by Disney and Universal, alleging that it trained AI image models on copyrighted works. Several AI model developers — including Meta — face similar allegations from copyright holders, however, recent court cases pertaining to AI training data have sided with tech companies.
Got a sensitive tip or confidential documents? We’re reporting on the inner workings of the AI industry — from the companies shaping its future to the people impacted by their decisions. Reach out to Rebecca Bellan at [email protected] and Maxwell Zeff at [email protected]. For secure communication, you can contact us via Signal at @rebeccabellan.491 and @mzeff.88.
We’re always looking to evolve, and by providing some insight into your perspective and feedback into TechCrunch and our coverage and events, you can help us! Fill out this survey to let us know how we’re doing and get the chance to win a prize in return!
-
Business2 weeks ago
Power and Portability Meet In This Near-Mint 13″ MacBook Pro
-
Technology2 weeks ago
StubHub is once again working on its IPO that could raise $1B
-
Travel2 weeks ago
9 Delaware Dishes That Slowly Vanished From Family Tables
-
Entertainment3 weeks ago
‘The White Lotus’ Star Sam Nivola Addresses Nepo Baby Label
-
Entertainment2 weeks ago
Kathy Griffin confirms third facelift after raising eyebrows with ‘very taut’ appearances
-
Life Style2 weeks ago
101 Inspirational September Quotes for a Motivated and Happy Start to Your Fall Season
-
Finance & Banking2 weeks ago
Index Hits Record High as Expectations of a Rate Cut Rise
-
Life Style2 weeks ago
101 Short Fall Quotes for a Positive, Motivated and Happy Autumn Season